Filter by
The language used throughout the course, in both instruction and assessments.
Results for "protecting+identity+and+platforms"
University of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Information Assurance, Data Security, Public Key Cryptography Standards (PKCS)
Queen Mary University of London
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Cloud Security, Personally Identifiable Information, Data Security, Regulation and Legal Compliance, Information Privacy, Cybersecurity, Cloud Services, Cloud Computing, Data Governance, Data Sharing
- Status: Free
Coursera Instructor Network
Skills you'll gain: Information Privacy, General Data Protection Regulation (GDPR), Personally Identifiable Information, Data Security, Data Governance, Data Ethics, Law, Regulation, and Compliance, Data Loss Prevention, Data Management, Security Controls, Regulatory Compliance, Compliance Management, Compliance Training, Data Sharing, Security Strategy, Regulatory Requirements, Data Processing, Risk Management, Employee Training, Risk Analysis
Microsoft
Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Data Security, Back-End Web Development, Authorization (Computing), Application Security, JSON, Identity and Access Management, Data Storage, Application Programming Interface (API), Encryption
University of Colorado System
Skills you'll gain: Risk Management Framework, Infrastructure Security, Cyber Security Policies, Continuous Monitoring, Security Management, Cyber Governance, Cybersecurity, Cyber Security Strategy, Security Strategy, Cyber Risk
Politecnico di Milano
Skills you'll gain: Data Strategy, Data Ethics, Data Sharing, Customer Data Management, Market Opportunities, Data Governance, Data-Driven Decision-Making, Big Data, Customer Insights, Personally Identifiable Information, Advertising, Personalized Service, Business Ethics, User Research
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Infrastructure Security, Firewall, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, System Configuration
Skills you'll gain: Role-Based Access Control (RBAC), Kubernetes, Authorization (Computing), Identity and Access Management, User Accounts, Development Environment, Cloud Engineering
Skills you'll gain: Cryptography, Data Security, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Secure Coding, Public Key Infrastructure, Security Controls, Authentications, Key Management, Identity and Access Management, Web Development, Application Security, Web Applications, Data Integrity, Multi-Factor Authentication
Skills you'll gain: Azure Active Directory, Role-Based Access Control (RBAC), Microsoft Windows, Microsoft Intune (Mobile Device Management Software), Active Directory, Enterprise Security, Identity and Access Management, System Configuration, Application Deployment, Desktop Support, User Provisioning, Systems Administration, Remote Access Systems, Patch Management, Operating Systems, Authentications, Authorization (Computing), Automation, Data Migration, Computer Hardware
- Status: Free
Universidades Anáhuac
Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Human Factors (Security)
Skills you'll gain: Cybersecurity, Network Security, Cyber Attacks, Cryptography, Threat Modeling, Information Systems Security, Identity and Access Management, Firewall, Encryption, Threat Detection, Public Key Infrastructure, Infrastructure Security, Security Controls, Authentications, Risk Management Framework, Authorization (Computing)
In summary, here are 10 of our most popular protecting+identity+and+platforms courses
- Cryptographic Hash and Integrity Protection: University of Colorado System
- Cloud Computing Law: Data Protection and Cybersecurity: Queen Mary University of London
- Data Privacy and Protection Standards: Coursera Instructor Network
- Security and Authentication: Microsoft
- Cybersecurity Policy for Water and Electricity Infrastructures: University of Colorado System
- Platform Thinking: exploiting data through platforms: Politecnico di Milano
- Palo Alto Networks Cybersecurity Foundation: Palo Alto Networks
- Using Role-based Access Control in Kubernetes Engine: Google Cloud
- Data Security for Web Developers: Codio
- Deploying Windows Clients & Managing Identities: Packt