Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "endpoint protection"
Skills you'll gain: Stakeholder Communications, Incident Response, Stakeholder Engagement, Computer Security Incident Management, Data Ethics, Cybersecurity, Security Awareness, Incident Management, Data Security, Communication, Asset Protection, Ethical Standards And Conduct, Business Ethics, Interviewing Skills, Professional Networking
University of Colorado Boulder
Skills you'll gain: SQL, Database Design, Database Management Systems, NoSQL, Data Warehousing, Database Theory, Relational Databases, Database Management, Database Architecture and Administration, Query Languages, Databases, Data Modeling, Data Analysis, MongoDB, Big Data, Apache Cassandra, Data Integrity, Data Manipulation, Data Processing, Transaction Processing
- Status: Free
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Mathematical Software, Algorithms
Imperial College London
Skills you'll gain: Health Assessment, Sanitation, Infection Control, Program Evaluation, Epidemiology, Infectious Diseases, Preventative Care, Environment Health And Safety, Behavioral Economics, Policy Analysis, Analysis, Behavioral Health, Intelligence Collection and Analysis, Emergency Response, Water Resources, Health And Safety Standards, Health Care, Health Systems, Social Sciences, Culture
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Cryptographic Protocols, Data Security, Email Security, Computer Security Awareness Training, Advanced Encryption Standard (AES), Security Awareness, Key Management, Secure Coding, Technical Support and Services, Information Technology, Cyber Security Strategy
University of Pennsylvania
Skills you'll gain: Blockchain, Cryptography, Digital Assets, Investments, Portfolio Management, Investment Management, FinTech, Asset Management, Financial Analysis, Financial Market, Emerging Technologies, Public Key Infrastructure, Finance, Payment Systems, Encryption, Return On Investment, Data Security, Data Integrity, Risk Analysis
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Infrastructure Security, Firewall, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, System Configuration
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Data Integrity
University of Pennsylvania
Skills you'll gain: Branding, Logo Design, Brand Strategy, Brand Awareness, Brand Management, Packaging and Labeling, Asset Protection, Business Strategy, Strategic Planning, Product Knowledge, Regulation and Legal Compliance, Law, Regulation, and Compliance, Innovation, Creativity, Risk Management, Business Strategies, Competitive Analysis, Analysis, Writing, Economics
Lund University
Skills you'll gain: Law, Regulation, and Compliance, Artificial Intelligence, Labor Law, Regulatory Compliance, Innovation, Criminal Investigation and Forensics, Information Privacy, Public Administration, Healthcare Industry Knowledge, Predictive Modeling, Health Care
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Threat Modeling, Personally Identifiable Information, Malware Protection, Email Security, Incident Response
In summary, here are 10 of our most popular endpoint protection courses
- Put It to Work: Prepare for Cybersecurity Jobs: Google
- Databases for Data Scientists: University of Colorado Boulder
- Cryptography I: Stanford University
- Foundations of Public Health Practice: Imperial College London
- Cybersecurity Fundamentals: IBM
- Cryptocurrency and Blockchain: An Introduction to Digital Currencies: University of Pennsylvania
- Palo Alto Networks Cybersecurity Foundation: Palo Alto Networks
- Introduction to Cyber Attacks: New York University
- Intellectual Property Law: University of Pennsylvania
- AI & Law : Lund University