Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "protection"
- Status: Free
Coursera Instructor Network
Skills you'll gain: Data Storytelling, Data Presentation, Data Visualization Software, Storytelling, Data-Driven Decision-Making, Data Integrity, Data Analysis, Presentations, Microsoft Excel, Communication, Design Elements And Principles
- Status: Free
University at Buffalo
Skills you'll gain: Blockchain, Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Payment Systems, Distributed Computing, FinTech, Network Model, Transaction Processing, Data Integrity, Emerging Technologies, Verification And Validation, Scalability
University of California, Davis
Skills you'll gain: Generative AI, ChatGPT, OpenAI, Data Ethics, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Innovation, Brainstorming, Machine Learning, Automation, Deep Learning, Workforce Development, Content Creation, Emerging Technologies, Ethical Standards And Conduct, Business Ethics, Information Privacy, Verification And Validation
- Status: Free
Macquarie University
Skills you'll gain: Excel Macros, Microsoft Excel, Data-Driven Decision-Making, Excel Formulas, Business Modeling, Spreadsheet Software, Data Validation, Productivity Software, Business Process Automation, Automation, Data Integrity
Google Cloud
Skills you'll gain: Email Security, Data Loss Prevention, Security Management, Malware Protection, Personally Identifiable Information, Google Workspace, Security Controls, Network Routing
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, MITRE ATT&CK Framework, Vulnerability Assessments, Infrastructure Security, Distributed Denial-Of-Service (DDoS) Attacks, Application Security, Cybersecurity, Payment Card Industry (PCI) Data Security Standards, Cloud Security, Network Security, NIST 800-53, Security Testing, Internet Of Things, Technical Communication, Technical Writing, Scripting, General Data Protection Regulation (GDPR), Network Analysis
Skills you'll gain: Application Security, Hardware Architecture, Security Engineering, Security Controls, Internet Of Things, Encryption, Secure Coding, Vulnerability Assessments, Cloud Security, Threat Modeling, Data Security, Security Requirements Analysis, Vulnerability Management, General Data Protection Regulation (GDPR), Personally Identifiable Information, Cryptography, Information Privacy, Authentications, Authorization (Computing)
Skills you'll gain: Dataflow, Data Pipelines, Serverless Computing, Data Processing, Apache Kafka, Cloud Security, Identity and Access Management, Performance Tuning, Google Cloud Platform, Data Integrity, Cloud Storage, Maintainability, Real Time Data, Data Transformation, Debugging, CI/CD, Containerization, Unit Testing, Data Storage Technologies, SQL
Johns Hopkins University
Skills you'll gain: Distributed Computing, Scalability, Database Design, Database Management Systems, Database Systems, Database Architecture and Administration, Database Management, Relational Databases, SQL, Performance Tuning, Data Integrity
Skills you'll gain: Microsoft SQL Servers, Transact-SQL, SQL, Power BI, Database Design, Data Modeling, Relational Databases, Database Architecture and Administration, Data Visualization Software, Data Integrity, Data Pipelines, Business Intelligence, Data Transformation, Data Management
Skills you'll gain: Data Storage, File Systems, Information Management, Data Infrastructure, Data Management, Disaster Recovery, Data Integrity, Server Administration, Configuration Management, System Configuration, Scalability, Software Installation
- Status: Free
Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Public Key Infrastructure, Data Integrity
In summary, here are 10 of our most popular protection courses
- Unlocking Business Insights through Storytelling with Data: Coursera Instructor Network
- 블록체인의 기초: University at Buffalo
- AI for Knowledge Workers: University of California, Davis
- مهارات الإكسل الخاصة التجارية: المستوى المتوسط الثاني: Macquarie University
- Google Workspace Mail Management 日本語版: Google Cloud
- CompTIA PenTest+ (PT0-002): Packt
- Implementing Security in IoT and Edge Devices: LearnQuest
- Serverless Data Processing with Dataflow en Español: Google Cloud
- Foundations of Distributed Database Systems: Johns Hopkins University
- Data Connection and Functionalities in Power BI: Edureka