Filter by
The language used throughout the course, in both instruction and assessments.
Results for "data+protection+methods"
Skills you'll gain: Network Security, Encryption, Cybersecurity, Security Awareness, Cyber Attacks, Security Management, Security Strategy, Threat Detection, Firewall, Wireless Networks, Technical Support, Malware Protection, Authentications, Multi-Factor Authentication, Authorization (Computing), Generative AI
- Status: Free
Campus BBVA
Skills you'll gain: Incident Management, Crisis Management, Security Information and Event Management (SIEM), Data Security, Cybersecurity, Cyber Attacks, Security Strategy, Information Systems Security, Cyber Operations, Information Assurance, Data Processing, Security Awareness, Network Security, Anomaly Detection, Data Science, Time Series Analysis and Forecasting, Unsupervised Learning
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Vulnerability Scanning, Encryption, Key Management, Virtual Machines
Skills you'll gain: Incident Response, Business Continuity Planning, Continuous Monitoring, Disaster Recovery, Threat Management, Risk Analysis, Risk Mitigation, Vulnerability Scanning, Security Information and Event Management (SIEM), Vulnerability Assessments, Investigation, Penetration Testing
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Endpoint Security, Threat Detection, Incident Response
- Status: Free
Northeastern University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Ethics, Law, Regulation, and Compliance, Data Security, Journalism, Emerging Technologies, Digital Communications, Data Collection, Internet Of Things, Machine Learning, Artificial Intelligence
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Information Privacy, Personally Identifiable Information, Regulatory Compliance, Compliance Management, Compliance Training, Data Security, Health Care Procedure and Regulation, Data Governance, Incident Response
Knowledge Accelerators
Skills you'll gain: General Data Protection Regulation (GDPR), Information Privacy, Personally Identifiable Information, Regulatory Compliance, Compliance Management, Data Security, Data Governance, Regulatory Requirements
Johns Hopkins University
Skills you'll gain: Data Manipulation, Data Cleansing, Data Integration, Data Import/Export, Data Collection, Data Management, Web Scraping, R Programming, MySQL, Application Programming Interface (API)
EC-Council
Skills you'll gain: Network Security, Mobile Security, Public Key Infrastructure, Cryptography, Security Controls, Cybersecurity, Authorization (Computing), Authentications, Identity and Access Management, Wireless Networks, Cloud Computing, Cloud Security, Network Monitoring, Data Security, Internet Of Things, Virtualization and Virtual Machines
- Status: Free
Coursera Instructor Network
Skills you'll gain: Personally Identifiable Information, Governance Risk Management and Compliance, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Cyber Attacks, Data Loss Prevention, Data Ethics, Cyber Governance, Cyber Risk, Encryption
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
In summary, here are 10 of our most popular data+protection+methods courses
- IT Security: Defense against the digital dark arts : Google
- Data & Cybersecurity: Campus BBVA
- Security Best Practices in Google Cloud: Google Cloud
- Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery : ISC2
- Cybersecurity Solutions and Microsoft Defender: Microsoft
- Data Privacy Fundamentals: Northeastern University
- Privacy Law and Data Protection: University of Pennsylvania
- The ABC's of GDPR: Protecting Privacy in an Online World : Knowledge Accelerators
- Getting and Cleaning Data: Johns Hopkins University
- Network Defense Essentials (NDE): EC-Council