Filter by
The language used throughout the course, in both instruction and assessments.
Results for "data+protection+methods"
Skills you'll gain: Network Security, Encryption, Cybersecurity, Security Awareness, Cyber Attacks, Security Management, Security Strategy, Threat Detection, Firewall, Wireless Networks, Technical Support, Malware Protection, Authentications, Multi-Factor Authentication, Authorization (Computing), Generative AI
- Status: Free
Campus BBVA
Skills you'll gain: Incident Management, Crisis Management, Security Information and Event Management (SIEM), Data Security, Cybersecurity, Cyber Attacks, Security Strategy, Information Systems Security, Cyber Operations, Information Assurance, Data Processing, Security Awareness, Network Security, Anomaly Detection, Data Science, Time Series Analysis and Forecasting, Unsupervised Learning
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Vulnerability Scanning, Encryption, Key Management, Virtual Machines
Skills you'll gain: Incident Response, Business Continuity Planning, Continuous Monitoring, Disaster Recovery, Threat Management, Risk Analysis, Risk Mitigation, Vulnerability Scanning, Security Information and Event Management (SIEM), Vulnerability Assessments, Investigation, Penetration Testing
- Status: Free
Northeastern University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Ethics, Law, Regulation, and Compliance, Data Security, Journalism, Emerging Technologies, Digital Communications, Data Collection, Internet Of Things, Machine Learning, Artificial Intelligence
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Endpoint Security, Threat Detection, Incident Response
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Information Privacy, Personally Identifiable Information, Regulatory Compliance, Compliance Management, Compliance Training, Data Security, Health Care Procedure and Regulation, Data Governance, Incident Response
Skills you'll gain: Cybersecurity, Application Security, Information Systems Security, Software Installation, System Configuration, Data Management, Security Controls, Computer Hardware, Data Security, Hardware Architecture, Data Storage, Information Technology Operations, Microsoft Windows, Firewall, Disaster Recovery, Encryption, Identity and Access Management
EC-Council
Skills you'll gain: Network Security, Mobile Security, Public Key Infrastructure, Cryptography, Security Controls, Cybersecurity, Authorization (Computing), Authentications, Identity and Access Management, Wireless Networks, Cloud Computing, Cloud Security, Network Monitoring, Data Security, Internet Of Things, Virtualization and Virtual Machines
- Status: Free
Coursera Instructor Network
Skills you'll gain: Personally Identifiable Information, Governance Risk Management and Compliance, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Cyber Attacks, Data Loss Prevention, Data Ethics, Cyber Governance, Cyber Risk, Encryption
Cisco Learning and Certifications
Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Information Systems Security, Cybersecurity, Network Security, Security Information and Event Management (SIEM), Network Monitoring, Information Assurance, Network Analysis, Intrusion Detection and Prevention, Event Monitoring, Data Capture, Data Integrity, Network Troubleshooting, Incident Response
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
In summary, here are 10 of our most popular data+protection+methods courses
- IT Security: Defense against the digital dark arts : Google
- Data & Cybersecurity: Campus BBVA
- Security Best Practices in Google Cloud: Google Cloud
- Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery : ISC2
- Data Privacy Fundamentals: Northeastern University
- Cybersecurity Solutions and Microsoft Defender: Microsoft
- Privacy Law and Data Protection: University of Pennsylvania
- Essential Aspects of Software, Hardware, and Data Backup: Microsoft
- Network Defense Essentials (NDE): EC-Council
- Introduction to Data Protection and Privacy: Coursera Instructor Network