Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "endpoint protection"
Coursera Project Network
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Web Scraping, Web Applications
Google
Skills you'll gain: Generative AI, Artificial Intelligence and Machine Learning (AI/ML), Productivity Software, Artificial Intelligence, Data Ethics, Security Awareness, Business Workflow Analysis, Innovation, Automation, Workflow Management, Information Privacy, Human Computer Interaction, Content Creation, Natural Language Processing, Complex Problem Solving
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
- Status: Free
Columbia University
Skills you'll gain: Economic Development, Socioeconomics, Community Development, Mitigation, Human Development, Environment, Economics, Environmental Policy, International Relations, Natural Resource Management, Health Care, Health Systems, Food Services, Public Policies
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Skills you'll gain: Cybersecurity, Cyber Operations, Cyber Threat Hunting, Intrusion Detection and Prevention, Scripting, Python Programming, Unix Commands, Command-Line Interface, Microsoft Windows, User Accounts
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Law, Regulation, and Compliance, Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
- Status: Free
École Polytechnique Fédérale de Lausanne
Skills you'll gain: Waste Minimization, Pollution Prevention, Environmental Management Systems, Environment and Resource Management, Governance, Community Development, Environment, Environmental Policy
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Vulnerability Scanning, Encryption, Key Management, Virtual Machines
University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Application Security, Cryptography, Data Storage
Skills you'll gain: Data Cleansing, Sampling (Statistics), Data Integrity, Data Quality, Data Validation, Google Sheets, Data Analysis, Data Manipulation, SQL, Data Transformation, Spreadsheet Software, Microsoft Excel
- Status: [object Object]
Skills you'll gain: Data Storytelling, Business Metrics, Key Performance Indicators (KPIs), Data Management, Data Collection, Data Governance, Bayesian Statistics, Data Analysis, Descriptive Statistics, Statistical Hypothesis Testing, Information Privacy, Data Cleansing, Pandas (Python Package), Data Visualization Software, Statistical Inference, Spreadsheet Software, Correlation Analysis, Google Sheets, Exploratory Data Analysis, Data Manipulation
In summary, here are 10 of our most popular endpoint protection courses
- Web Application Security Testing with OWASP ZAP:Â Coursera Project Network
- Google AI Essentials:Â Google
- IBM Cybersecurity Analyst:Â IBM
- The Age of Sustainable Development:Â Columbia University
- IT Fundamentals for Cybersecurity:Â IBM
- Execution, persistence, privilege escalation and evasion:Â Infosec
- Cybersecurity: Developing a Program for Your Business:Â Kennesaw State University
- Municipal Solid Waste Management in Developing Countries: École Polytechnique Fédérale de Lausanne
- Security Best Practices in Google Cloud:Â Google Cloud
- Networking and Security in iOS Applications:Â University of California, Irvine