Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "protection"
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, NIST 800-53, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
Macquarie University
Skills you'll gain: Microsoft Excel, Dashboard, Excel Formulas, Spreadsheet Software, Data Visualization, Excel Macros, Data Validation, Data Analysis Expressions (DAX), Data Cleansing, Data Modeling, Business Intelligence, Workflow Management, Financial Modeling, Data Management, Microsoft 365, Consolidation, Data Integrity, Data Entry, Business Reporting, Productivity Software
The Hong Kong University of Science and Technology
Skills you'll gain: E-Commerce, Global Marketing, Business Strategies, Innovation, Strategic Partnership, Business Strategy, Price Negotiation, Corporate Strategy, New Business Development, Mergers & Acquisitions, Organizational Strategy, Competitive Analysis, Resource Management, Resource Utilization
- Status: Free
University of Geneva
Skills you'll gain: Health Care Procedure and Regulation, Infectious Diseases, Environment Health And Safety, Epidemiology, Health Systems, International Relations, Regulatory Compliance, Public Safety and National Security, Health Administration, Emergency Response, Governance
University of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Security Controls, Human Factors (Security), Asset Protection, Due Diligence
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Data Integrity
University of Colorado System
Skills you'll gain: Database Design, Relational Databases, Data Modeling, Database Management Systems, Databases, Oracle Databases, SQL, Data Warehousing, Data Integrity, PostgreSQL
Skills you'll gain: Data Cleansing, Sampling (Statistics), Data Integrity, Data Quality, Data Validation, Google Sheets, Data Analysis, Data Manipulation, SQL, Data Transformation, Spreadsheet Software, Microsoft Excel
University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Information Systems Security, Cybersecurity, Encryption, Virtual Private Networks (VPN), Cyber Attacks, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
University of Michigan
Skills you'll gain: Anatomy, Kinesiology, Structural Analysis, Medical Terminology
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: DevSecOps, Cloud Security, Threat Management, Kubernetes, Application Security, Cloud Applications, Serverless Computing, Cloud Computing, Security Controls, Containerization, Amazon Web Services, CI/CD, Application Programming Interface (API)
In summary, here are 10 of our most popular protection courses
- Assets, Threats, and Vulnerabilities: Google
- Excel Skills for Business: Macquarie University
- Protecting Business Innovations via Strategy: The Hong Kong University of Science and Technology
- Global Health Security, Solidarity and Sustainability through the International Health Regulations: University of Geneva
- Personnel & Third-Party Security: University of California, Irvine
- Introduction to Cyber Attacks: New York University
- Database Management Essentials: University of Colorado System
- Process Data from Dirty to Clean: Google
- Security and Privacy in TOR Network: University of Colorado System
- Introduction to Cyber Security: New York University