Filter by
The language used throughout the course, in both instruction and assessments.
Results for "data+protection+methods"
Queen Mary University of London
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Cloud Security, Personally Identifiable Information, Data Security, Regulation and Legal Compliance, Information Privacy, Cybersecurity, Cloud Services, Cloud Computing, Data Governance, Data Sharing
- Status: Free
Politecnico di Milano
Skills you'll gain: Economics, Policy, and Social Studies, Socioeconomics, Epidemiology, Crisis Management, Social and Human Services, Social Sciences, Infectious Diseases, Health Systems, Mental Health, Health Care, Environmental Monitoring, Data-Driven Decision-Making, Research, Data Collection, Cross-Functional Collaboration, Statistical Modeling, Artificial Intelligence
Board Infinity
Whizlabs
Skills you'll gain: Amazon S3, Cloud Storage, Data Management, Data Storage Technologies, Data Storage, Network Troubleshooting, Disaster Recovery, Version Control
Skills you'll gain: Microsoft Azure, Cloud Security, Infrastructure Security, Kubernetes, Data Security, Virtual Machines, Remote Access Systems, Role-Based Access Control (RBAC), Data Storage Technologies, Identity and Access Management, Databases, Containerization, Database Management, Key Management, Encryption
Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, Security Controls, Cloud Security, Encryption, Data Security, Information Assurance, Cybersecurity, Identity and Access Management, Cloud Computing, Penetration Testing, Personally Identifiable Information, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Incident Management
Johns Hopkins University
Skills you'll gain: Email Security, Malware Protection, Mobile Security, Cybersecurity, Network Security, Internet Of Things, Open Web Application Security Project (OWASP), Network Monitoring, Security Controls, TCP/IP, Threat Detection, Network Analysis, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Border Gateway Protocol, Infrastructure Security, Application Security, Information Systems Security, Threat Modeling, Network Routing
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Mobile Security, Cybersecurity, Cyber Threat Intelligence, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Intrusion Detection and Prevention, Encryption, Network Protocols
University of Colorado Boulder
Skills you'll gain: Web Scraping, Data Integration, Data Cleansing, Data Import/Export, Data Quality, Data Processing, Data Collection, Data Manipulation, SQL, MySQL, Databases, Query Languages, Extensible Markup Language (XML), Pandas (Python Package), Application Programming Interface (API), Python Programming
Skills you'll gain: Data Loss Prevention, Google Cloud Platform, Data Access, Cloud Storage, Data Security, Cloud Computing, Personally Identifiable Information, Unstructured Data
Johns Hopkins University
Skills you'll gain: Database Management, Database Architecture and Administration, Apache Hadoop, Query Languages, Big Data, Databases, SQL, Data Access, Distributed Computing, Performance Tuning, Data Processing, Data Integrity, Authorization (Computing), Data Storage Technologies
Arizona State University
Skills you'll gain: Data Transformation, Engineering Management, Data-Driven Decision-Making, Computational Thinking, Exploratory Data Analysis, Data Storytelling, Capacity Management, Data Analysis, Decision Making, Data Strategy, Data Management, Unstructured Data, Business Intelligence, Complex Problem Solving, Design Thinking, Data Storage, Data Access, Solution Design, Automation, Management Reporting
In summary, here are 10 of our most popular data+protection+methods courses
- Cloud Computing Law: Data Protection and Cybersecurity: Queen Mary University of London
- Tools and Practices for Addressing Pandemic Challenges: Politecnico di Milano
- Teradata SQL and Data Management: Board Infinity
- AWS: Data Management and Backups: Whizlabs
- Azure: Compute, Storage, and Database Security: Whizlabs
- Protection of Information Assets: Packt
- Information Assurance Analysis: Johns Hopkins University
- Advanced Cybersecurity Techniques: Johns Hopkins University
- Data Collection and Integration: University of Colorado Boulder
- Creating a De-identified Copy of Data in Cloud Storage: Google Cloud