Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "endpoint protection"
Skills you'll gain: UI/UX Research, Usability Testing, User Experience Design, Usability, Presentations, Design Research, Persona (User Experience), User Centered Design, Research Methodologies, Prototyping, Interviewing Skills, Figma (Design Software), Information Privacy, Personally Identifiable Information
Skills you'll gain: Extract, Transform, Load, Power BI, Data Integrity, Data Validation, Data Transformation, Data Cleansing, Microsoft Power Platform, Data Storage, Data Analysis, Data Integration, Data Import/Export, Business Intelligence
Lund University
Skills you'll gain: Law, Regulation, and Compliance, Regulation and Legal Compliance, Artificial Intelligence, Labor Law, Innovation, Criminal Investigation and Forensics, Information Privacy, Public Administration, Healthcare Industry Knowledge, Predictive Modeling, FinTech, Health Care
- Status: Free
Universiteit Leiden
Skills you'll gain: Law, Regulation, and Compliance, International Relations, Conflict Management, Child Welfare, Ethical Standards And Conduct, Disabilities, Journalism
University at Buffalo
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Network Protocols, FinTech, Virtual Environment, Data Integrity, Emerging Technologies, Data Security, Data Validation, User Accounts
- Status: Free
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Cryptographic Protocols, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Mathematical Software, Algorithms, Probability
Skills you'll gain: Stakeholder Communications, Incident Response, Stakeholder Engagement, Computer Security Incident Management, Data Ethics, Cybersecurity, Security Awareness, Incident Management, Data Security, Communication, Asset Protection, Ethical Standards And Conduct, Business Ethics, Interviewing Skills, Professional Networking
Skills you'll gain: OAuth, API Gateway, Cloud API, Application Programming Interface (API), API Design, Restful API, Authentications, Security Controls, Authorization (Computing), Application Security, Information Systems Security, Network Security, Data Security, JSON, Identity and Access Management
Cisco Learning and Certifications
Skills you'll gain: File Systems, Endpoint Security, Linux, Microsoft Windows, Windows PowerShell, Linux Administration, Windows Servers, Operating Systems, Linux Commands, Network Administration, Active Directory, System Monitoring, System Configuration, OS Process Management, Network Security, Security Controls, Command-Line Interface, Systems Administration
- Status: New
Skills you'll gain: ChatGPT, Generative AI, OpenAI, Data Ethics, Artificial Intelligence, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Technical Communication, Information Privacy, Natural Language Processing, Diversity Equity and Inclusion Initiatives, Mitigation
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
Skills you'll gain: Instagram, Social Media, Advertising Campaigns, Advertising, Marketing Materials, Social Media Marketing, Social Media Content, Social Media Strategy, Facebook, Copywriting, Content Creation, Marketing, Information Privacy, Campaign Management, Data Collection, Target Audience
In summary, here are 10 of our most popular endpoint protection courses
- Conduct UX Research and Test Early Concepts:Â Google
- Extract, Transform and Load Data in Power BI:Â Microsoft
- AI & Law :Â Lund University
- International Humanitarian Law in Theory and Practice :Â Universiteit Leiden
- Blockchain Basics:Â University at Buffalo
- Cryptography I:Â Stanford University
- Put It to Work: Prepare for Cybersecurity Jobs:Â Google
- API Security on Google Cloud's Apigee API Platform:Â Google Cloud
- Endpoints and Systems:Â Cisco Learning and Certifications
- Generative AI for Educators:Â IBM