Filter by
The language used throughout the course, in both instruction and assessments.
Results for "protection"
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Endpoint Security, Threat Detection, Incident Response
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Cyber Attacks, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
- Status: [object Object]
Skills you'll gain: Data Storytelling, Business Metrics, Key Performance Indicators (KPIs), Data Management, Data Collection, Data Governance, Bayesian Statistics, Data Analysis, Descriptive Statistics, Statistical Hypothesis Testing, Information Privacy, Data Cleansing, Pandas (Python Package), Data Visualization Software, Statistical Inference, Spreadsheet Software, Correlation Analysis, Google Sheets, Exploratory Data Analysis, Data Manipulation
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
University at Buffalo
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Network Protocols, FinTech, Virtual Environment, Data Integrity, Emerging Technologies, Data Security, Data Validation, User Accounts
Knowledge Accelerators
Skills you'll gain: General Data Protection Regulation (GDPR), Information Privacy, Personally Identifiable Information, Regulatory Compliance, Compliance Management, Data Security, Data Governance, Regulatory Requirements
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Role-Based Access Control (RBAC), Containerization
Skills you'll gain: Mac OS, Cyber Threat Intelligence, Network Security, Malware Protection, Threat Management, Endpoint Security, Threat Detection, Computer Security Awareness Training, Multi-Factor Authentication, Security Strategy, Information Systems Security, Firewall, Automation
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
Skills you'll gain: Malware Protection, Computer Security Awareness Training, Security Awareness, Mobile Security, Network Security, Data Security, Cyber Attacks, Cybersecurity, Human Factors (Security), Email Security, Identity and Access Management, Multi-Factor Authentication, Authentications
Macquarie University
Skills you'll gain: Microsoft Excel, Dashboard, Excel Formulas, Spreadsheet Software, Data Visualization, Excel Macros, Data Validation, Data Analysis Expressions (DAX), Data Cleansing, Data Modeling, Business Intelligence, Financial Modeling, Workflow Management, Data Management, Microsoft 365, Consolidation, Data Integrity, Data Entry, Business Reporting, Productivity Software
- Status: Free
University of Manchester
Skills you'll gain: Process Engineering, Maintenance, Repair, and Facility Services, Engineering, Engineering Design Process, Failure Analysis, Industrial Design, Engineering Analysis, Engineering Calculations, Environmental Issue
In summary, here are 10 of our most popular protection courses
- Cybersecurity Solutions and Microsoft Defender: Microsoft
- Assets, Threats, and Vulnerabilities: Google
- Meta Data Analyst: Meta
- IT Fundamentals for Cybersecurity: IBM
- Blockchain Basics: University at Buffalo
- The ABC's of GDPR: Protecting Privacy in an Online World : Knowledge Accelerators
- Cloud Security Risks: Identify and Protect Against Threats: Google Cloud
- Enhancing Mac Security: Strategies for Protection: LearnQuest
- Computer Networks and Network Security: IBM
- Security Awareness Training: ISC2