Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "securing+data"
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Applications, Cloud Services, Application Deployment, Virtual Machines, Security Controls, Cloud Computing, Threat Management, Generative AI, Virtual Private Networks (VPN), Data Security
Skills you'll gain: Network Security, Information Systems Security, Cybersecurity, Application Security, Encryption, Security Controls, Cyber Attacks, Security Awareness, Data Security, Cryptography, Threat Modeling, Security Management, Network Administration, Computer Security Awareness Training, Information Assurance, Wireless Networks, Hardening, Firewall, Malware Protection, Authentications
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Databases, Software Architecture, Secure Coding, Software Design Patterns, Systems Design, Software Engineering, Software Development Tools, Software Development Life Cycle, Technical Design, Security Engineering
Skills you'll gain: Network Security, Hardening, Network Protocols, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
- Status: Free
Campus BBVA
Skills you'll gain: Incident Management, Crisis Management, Security Information and Event Management (SIEM), Data Security, Cybersecurity, Cyber Attacks, Security Strategy, Information Systems Security, Cyber Operations, Information Assurance, Data Processing, Security Awareness, Network Security, Anomaly Detection, Data Science, Time Series Analysis and Forecasting, Unsupervised Learning
- Status: Free
Northeastern University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Ethics, Law, Regulation, and Compliance, Data Security, Journalism, Emerging Technologies, Digital Communications, Data Collection, Internet Of Things, Machine Learning, Artificial Intelligence
University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, Human Factors, Information Privacy, Personally Identifiable Information, User Interface and User Experience (UI/UX) Design, User Acceptance Testing (UAT), Multi-Factor Authentication, Human Centered Design, Data Sharing
- Status: New
Skills you'll gain: Penetration Testing, Incident Response, Network Security, Intrusion Detection and Prevention, Cybersecurity, Computer Security Incident Management, Cyber Security Strategy, Application Security, Open Web Application Security Project (OWASP), Cyber Attacks, Information Systems Security, Identity and Access Management, Vulnerability Assessments, Cryptography, Secure Coding, Encryption, Risk Management Framework, Command-Line Interface, Hardening, Threat Management
Johns Hopkins University
Skills you'll gain: Security Awareness, Personally Identifiable Information, Encryption, Health Information Management and Medical Records, Healthcare Industry Knowledge, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Information Privacy, Regulatory Compliance, Cloud Computing, Patient Safety, End User Training and Support
- Status: New
SkillUp EdTech
Skills you'll gain: Data Security, Data Governance, Data Architecture, Data Quality, Personally Identifiable Information, Incident Response, Data Loss Prevention, Threat Detection, General Data Protection Regulation (GDPR), Risk Management, Cybersecurity, Compliance Management, Encryption, Data Integrity, Role-Based Access Control (RBAC)
In summary, here are 10 of our most popular securing+data courses
- Security in Google Cloud: Google Cloud
- IT Security: Defense against the digital dark arts : Google
- Secure Software Design: University of Colorado System
- Connect and Protect: Networks and Network Security: Google
- Assets, Threats, and Vulnerabilities: Google
- Advanced System Security Design: University of Colorado System
- Data & Cybersecurity: Campus BBVA
- Data Privacy Fundamentals: Northeastern University
- Usable Security: University of Maryland, College Park
- CompTIA Security+ Certification (SY0-701): The Total Course: Packt