Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "endpoint protection"
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
- Status: Free
Michigan State University
Skills you'll gain: Storyboarding, Writing, Storytelling, Peer Review, Content Creation
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Threat Modeling, Personally Identifiable Information, Malware Protection, Email Security
Skills you'll gain: Data Ethics, Data Analysis, Data Security, Google Sheets, Databases, Data Storage, Data Quality, Data Integrity, Data Management, Data Collection, Data Manipulation, Relational Databases, SQL, Metadata Management, Unstructured Data
Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Microsoft Azure, System Monitoring, Identity and Access Management, Cloud Security, Enterprise Security, Data Governance, Authorization (Computing), User Provisioning, Multi-Factor Authentication, Authentications
DeepLearning.AI
Skills you'll gain: Generative AI, PyTorch (Machine Learning Library), Image Analysis, Deep Learning, Artificial Neural Networks, Data Ethics, Applied Machine Learning, Computer Vision, Machine Learning, Computer Graphics, Computer Graphic Techniques, Data Transformation, Artificial Intelligence and Machine Learning (AI/ML), Information Privacy, Data Synthesis
- Status: Free
Michigan State University
Skills you'll gain: Peer Review, Editing, Storytelling, Proofreading
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Firewall, Threat Detection, Incident Response, Encryption
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Presentation, Data Governance, Data Security, Data Migration, Database Design, Data Visualization, Interactive Data Visualization, Descriptive Statistics, Data Mining, Cloud Storage, Data Visualization Software, IBM DB2, Extract, Transform, Load, Data Management, MySQL, Excel Formulas
Skills you'll gain: Data Cleansing, Sampling (Statistics), Data Integrity, Data Quality, Data Validation, Data Analysis, Data Processing, Data Manipulation, SQL, Data Transformation, Spreadsheet Software
University of Pennsylvania
Skills you'll gain: Branding, Logo Design, Brand Strategy, Brand Awareness, Brand Management, Packaging and Labeling, Asset Protection, Business Strategy, Strategic Planning, Product Knowledge, Regulation and Legal Compliance, Law, Regulation, and Compliance, Innovation, Creativity, Risk Management, Business Strategies, Competitive Analysis, Analysis, Writing, Economics
In summary, here are 10 of our most popular endpoint protection courses
- Computer Networks and Network Security:Â IBM
- Write A Feature Length Screenplay For Film Or Television:Â Michigan State University
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Introduction to Cybersecurity Fundamentals:Â Coursera Instructor Network
- Prepare Data for Exploration:Â Google
- Identity Protection and Governance : Microsoft
- Generative Adversarial Networks (GANs):Â DeepLearning.AI
- Script Writing: Write a Pilot Episode for a TV or Web Series (Project-Centered Course):Â Michigan State University
- Cybersecurity Solutions and Microsoft Defender:Â Microsoft
- IBM Data Management:Â IBM