Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "endpoint protection"
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection, Data Sharing
Skills you'll gain: Patch Management, Data Security, Cloud Security, Amazon Web Services, Data Governance, AWS Identity and Access Management (IAM), Cyber Governance, Cloud Management, Key Management, Amazon S3, Data Encryption Standard, Configuration Management
Skills you'll gain: Contract Negotiation, Peer Review, Active Listening, Negotiation, Media Production, Law, Regulation, and Compliance, Ethical Standards And Conduct, Constructive Feedback, Business Ethics, Content Creation, Writing, Contract Review, Data Import/Export, Editing, Multimedia, Regulatory Compliance, File Management, Asset Protection, Decision Making, Creativity
- Status: Free
University of Geneva
Skills you'll gain: Social Justice, Disabilities, International Relations, Law, Regulation, and Compliance, Human Services, Diversity Awareness, Regulation and Legal Compliance, Environmental Issue, Political Sciences, Diplomacy, Cultural Diversity, Ethical Standards And Conduct, Policy Analysis, Economics, Policy, and Social Studies, Investigation, Research Methodologies, Governance
- Status: Free
The University of North Carolina at Chapel Hill
Skills you'll gain: Environmental Policy, Law, Regulation, and Compliance, Pollution Prevention, Environment and Resource Management, Natural Resource Management, Water Resources, Risk Analysis, Social Justice, Research
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
University of Colorado Boulder
Skills you'll gain: Electrical Safety, Thermal Management, Basic Electrical Systems, Manufacturing and Production, Failure Analysis, Failure Mode And Effects Analysis, Electronic Components, High Voltage, Electrical Engineering, Manufacturing Processes, Safety Assurance, Embedded Systems, Performance Testing, System Requirements, Engineering Calculations
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Endpoint Security, Threat Detection, Incident Response
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
New York University
Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
- Status: [object Object]
Microsoft
Skills you'll gain: Data Storytelling, Dashboard, Excel Formulas, Extract, Transform, Load, Power BI, Data Analysis Expressions (DAX), Microsoft Excel, Data Modeling, Data-Driven Decision-Making, Star Schema, Data Analysis, Data Presentation, Data Visualization Software, Microsoft Power Platform, Data Integrity, Spreadsheet Software, Data Validation, Data Transformation, Data Cleansing, Data Visualization
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Data Integrity
In summary, here are 10 of our most popular endpoint protection courses
- Proactive Computer Security:Â University of Colorado System
- AWS: Data Protection and Security Governance:Â Whizlabs
- The Business of Music Production:Â Berklee
- Introduction aux Droits de l’Homme: University of Geneva
- Introduction to Environmental Law and Policy:Â The University of North Carolina at Chapel Hill
- Operating Systems: Overview, Administration, and Security:Â IBM
- Introduction to battery-management systems:Â University of Colorado Boulder
- Cybersecurity Solutions and Microsoft Defender:Â Microsoft
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Real-Time Cyber Threat Detection and Mitigation:Â New York University