Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "endpoint protection"
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Vulnerability Scanning, Encryption, Key Management, Virtual Machines
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Firewall, Threat Detection, Incident Response, Encryption
Skills you'll gain: Data Modeling, Database Design, Extract, Transform, Load, Data Warehousing, Databases, Performance Tuning, Data Pipelines, Database Systems, Data Integrity, Business Intelligence, Data Mart, Data Validation, Data Quality, SQL, Data Transformation, Performance Testing
- Status: Free
Michigan State University
Skills you'll gain: Peer Review, Editing, Storytelling, Proofreading
Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, NIST 800-53, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR), Business Ethics
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Microsoft Azure, System Monitoring, Identity and Access Management, Cloud Security, Enterprise Security, Data Governance, Authorization (Computing), User Provisioning, Multi-Factor Authentication, Authentications
Skills you'll gain: OAuth, API Gateway, Cloud API, Application Programming Interface (API), API Design, Restful API, Authentications, Security Controls, Authorization (Computing), Application Security, Information Systems Security, Network Security, Data Security, JSON, Identity and Access Management
- Status: New
Skills you'll gain: ChatGPT, Generative AI, OpenAI, Teaching, Artificial Intelligence, Instructional Design, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Diversity Equity and Inclusion Initiatives, Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Ethical Standards And Conduct, Technical Communication, Information Privacy, Data Analysis Software, Natural Language Processing
Skills you'll gain: Extract, Transform, Load, Power BI, Data Integrity, Data Validation, Data Transformation, Data Cleansing, Microsoft Power Platform, Data Storage, Data Analysis, Data Integration, Data Import/Export, Business Intelligence
University of Pennsylvania
Skills you'll gain: Branding, Logo Design, Brand Strategy, Brand Awareness, Brand Management, Packaging and Labeling, Asset Protection, Business Strategy, Strategic Planning, Product Knowledge, Regulation and Legal Compliance, Law, Regulation, and Compliance, Innovation, Creativity, Risk Management, Business Strategies, Competitive Analysis, Analysis, Writing, Economics
In summary, here are 10 of our most popular endpoint protection courses
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Security Best Practices in Google Cloud:Â Google Cloud
- Cybersecurity Solutions and Microsoft Defender:Â Microsoft
- The Path to Insights: Data Models and Pipelines:Â Google
- Script Writing: Write a Pilot Episode for a TV or Web Series (Project-Centered Course):Â Michigan State University
- Cybersecurity Compliance Framework, Standards & Regulations:Â IBM
- Operating Systems: Overview, Administration, and Security:Â IBM
- Identity Protection and Governance : Microsoft
- API Security on Google Cloud's Apigee API Platform:Â Google Cloud
- Generative AI for Educators:Â IBM