Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "endpoint protection"
- Status: Free
Vanderbilt University
Skills you'll gain: Clinical Data Management, Data Capture, Clinical Research, Data Management, Data Collection, Data Sharing, Data Strategy, Data Quality, Data Integrity, Data Validation, Regulatory Compliance
Skills you'll gain: Data Modeling, Database Design, Extract, Transform, Load, Data Warehousing, Performance Tuning, Data Pipelines, Data Integrity, Business Intelligence, Business Process, Data Mart, Data Validation, Data Quality, SQL, Performance Testing
Skills you'll gain: UI/UX Research, Usability Testing, User Experience Design, Usability, Presentations, User Research, User Experience, Design Research, Research Design, User Centered Design, Research Methodologies, Prototyping, Interviewing Skills, Information Privacy
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Firewall, Security Controls, Endpoint Security, Threat Detection, Virtual Machines, Encryption
University of Pennsylvania
Skills you'll gain: Intellectual Property, Law, Regulation, and Compliance, Creativity, Legal Strategy, Lawsuits, Musical Composition, Legal Research, Commercial Laws
University of Michigan
Skills you'll gain: Stored Procedure, Database Design, SQL, Relational Databases, NoSQL, PostgreSQL, Database Architecture and Administration, Database Theory, Database Management Systems, Data Modeling, JSON, Scalability, Database Management, Query Languages, Cloud Applications, Data Manipulation, Text Mining, Databases, Data Integrity, Data Import/Export
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Diplomacy, Infrastructure Architecture, Conflict Management, Security Management, Political Sciences, Media and Communications, Psychology
Microsoft
Skills you'll gain: Microsoft Azure, Application Security, Cloud Security, Infrastructure Security, Kubernetes, Network Security, Security Engineering, Firewall, Endpoint Security, Identity and Access Management, Infrastructure As A Service (IaaS), Role-Based Access Control (RBAC), Virtual Machines, Containerization, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Private Networks (VPN), Encryption
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Human Factors (Security), Encryption
Queen Mary University of London
Skills you'll gain: General Data Protection Regulation (GDPR), Cloud Services, Legal Risk, Cloud Computing, Tax, Tax Laws, Law, Regulation, and Compliance, Intellectual Property, Cloud Security, Personally Identifiable Information, Tax Compliance, Data Security, Information Privacy, Regulation and Legal Compliance, Contract Negotiation, Vendor Contracts, Cybersecurity, Contract Review, Data Governance, Data Access
- Status: Free
École Polytechnique Fédérale de Lausanne
Skills you'll gain: Waste Minimization, Environmental Engineering, Pollution Prevention, Environmental Management Systems, Environment and Resource Management, Governance, Environmental Science, Community Development, Environmental Regulations, Environmental Policy
- Status: Free
Michigan State University
Skills you'll gain: Storyboarding, Writing, Writing and Editing, Storytelling, Peer Review
In summary, here are 10 of our most popular endpoint protection courses
- Data Management for Clinical Research:Â Vanderbilt University
- The Path to Insights: Data Models and Pipelines:Â Google
- Conduct UX Research and Test Early Concepts:Â Google
- Cybersecurity Solutions and Microsoft Defender:Â Microsoft
- Copyright Law:Â University of Pennsylvania
- PostgreSQL for Everybody:Â University of Michigan
- International Cyber Conflicts:Â The State University of New York
- Implement Platform Protection:Â Microsoft
- Systems and Application Security:Â ISC2
- Cloud Computing Law:Â Queen Mary University of London