Filter by
The language used throughout the course, in both instruction and assessments.
Results for "protection"
University of Pennsylvania
Skills you'll gain: Branding, Logo Design, Brand Strategy, Brand Awareness, Brand Management, Asset Protection, Packaging and Labeling, Regulation and Legal Compliance, Law, Regulation, and Compliance, Risk Management
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection, Data Sharing
Skills you'll gain: Cybersecurity, Cyber Operations, Cyber Threat Hunting, Intrusion Detection and Prevention, Scripting, Python Programming, Unix Commands, Command-Line Interface, Microsoft Windows, User Accounts
The Hong Kong University of Science and Technology
Skills you'll gain: E-Commerce, Global Marketing, Brand Management, Business Strategies, Branding, Brand Strategy, Innovation, Strategic Partnership, Price Negotiation, New Business Development, Corporate Strategy, Mergers & Acquisitions, Business Process, Digital Assets, Business Strategy, Business Software, Law, Regulation, and Compliance, Commercialization, New Product Development, Creativity
Imperial College London
Skills you'll gain: Behavioral Economics, Behavioral Health, Social Sciences, Policy Analysis, Culture, Public Policies, Health Care, Cultural Diversity, Psychology, Economics, Policy, and Social Studies, Research, Risk Analysis
Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Security Requirements Analysis, Penetration Testing, Information Systems Security, Human Factors (Security), Cybersecurity, Threat Detection, Cloud Security, Vulnerability Assessments, Cyber Attacks, Encryption, Vulnerability Management, Risk Management Framework, Data Security, Security Management, Personally Identifiable Information
Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Information Systems Security, Cybersecurity, Cloud Security, Cyber Attacks, Intrusion Detection and Prevention, Computer Networking, Data Security, Security Controls
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Identity and Access Management, Business Risk Management, Security Controls
Universidad de los Andes
Skills you'll gain: Cryptography, Security Requirements Analysis, Human Factors (Security), Encryption, Data Security, Security Management, Personally Identifiable Information, Threat Management, ISO/IEC 27001, Information Assurance, Cyber Attacks, Cybersecurity, Security Awareness, Law, Regulation, and Compliance
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
The Hong Kong University of Science and Technology
Skills you'll gain: E-Commerce, Global Marketing, Business Strategies, Innovation, Strategic Partnership, Business Strategy, Price Negotiation, New Business Development, Corporate Strategy, Mergers & Acquisitions, Law, Regulation, and Compliance, Competitive Analysis, Resource Management, Resource Utilization
University of Colorado System
Skills you'll gain: Risk Management Framework, Infrastructure Security, Cyber Security Policies, Continuous Monitoring, Security Management, Cyber Governance, Cybersecurity, Cyber Security Strategy, Security Strategy, Cyber Risk
In summary, here are 10 of our most popular protection courses
- Trademark Law:Â University of Pennsylvania
- Proactive Computer Security:Â University of Colorado System
- Execution, persistence, privilege escalation and evasion:Â Infosec
- Protecting Business Innovation:Â The Hong Kong University of Science and Technology
- Foundations of Public Health Practice: Behaviour & Behaviour Change:Â Imperial College London
- Ciberseguridad:Â Universidad de los Andes
- Seguridad en la red:Â Universidad de los Andes
- Tools for Security Specialists:Â Codio
- Principios y Regulaciones de Seguridad de la Información: Universidad de los Andes
- Introduction to Cyber Security:Â New York University