Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "protection schemes"
Skills you'll gain: Electrical Substation, High Voltage, Electrical Safety, Electrical Engineering, Low Voltage, Three-Phase, Artificial Neural Networks, Automation, Control Panels
- Status: AI skills
Microsoft
Skills you'll gain: Data Storytelling, Dashboard, Excel Formulas, Extract, Transform, Load, Power BI, Data Analysis Expressions (DAX), Microsoft Excel, Data Modeling, Data-Driven Decision-Making, Star Schema, Data Analysis, Data Presentation, Data Visualization Software, Microsoft Power Platform, Data Integrity, Spreadsheet Software, Data Validation, Data Transformation, Data Cleansing, Data Visualization
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
- Status: Free
Coursera Instructor Network
Skills you'll gain: Information Privacy, General Data Protection Regulation (GDPR), Personally Identifiable Information, Data Security, Data Governance, Data Ethics, Law, Regulation, and Compliance, Data Loss Prevention, Data Management, Security Controls, Regulatory Compliance, Compliance Management, Compliance Training, Data Sharing, Security Strategy, Regulatory Requirements, Data Processing, Risk Management, Employee Training, Risk Analysis
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Information Privacy, Personally Identifiable Information, Regulatory Compliance, Compliance Management, Compliance Training, Data Security, Regulatory Requirements, Compliance Reporting, Health Care Procedure and Regulation, Data Governance, Computer Security Incident Management, Incident Response
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Skills you'll gain: Electrical Substation, Electrical Safety, Plant Operations and Management, Three-Phase, High Voltage, Applied Mathematics, Power Electronics, Electrical Wiring, Basic Electrical Systems, Process Control, Mathematical Modeling, Matlab, Electrical Engineering, Wiring Diagram, Low Voltage, Automation, Simulation and Simulation Software, Maintenance, Repair, and Facility Services, Reliability, Engineering Calculations
- Status: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
- Status: Free
Northeastern University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Ethics, Law, Regulation, and Compliance, Data Security, Journalism, Emerging Technologies, Digital Communications, Data Collection, Internet Of Things, Machine Learning, Artificial Intelligence
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Threat Modeling, Personally Identifiable Information, Malware Protection, Email Security, Incident Response
- Status: Free
Coursera Instructor Network
Skills you'll gain: Personally Identifiable Information, Governance Risk Management and Compliance, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Cyber Attacks, Data Loss Prevention, Data Ethics, Cyber Governance, Cyber Risk, Encryption
Johns Hopkins University
Skills you'll gain: Clinical Data Management, Clinical Trials, Sample Size Determination, Clinical Research, Data Quality, Quality Assurance, Data Cleansing, Data Management, Regulatory Compliance, Data Integrity, Microsoft Excel, Statistical Reporting, Data Compilation, Data Collection, Scientific Methods, Biostatistics, Data Sharing, Patient Safety, Risk Management, Ethical Standards And Conduct
Searches related to protection schemes
In summary, here are 10 of our most popular protection schemes courses
- Advanced Study of Protection Schemes and Switchgear:Â L&T EduTech
- Microsoft Power BI Data Analyst:Â Microsoft
- IBM Cybersecurity Analyst:Â IBM
- Data Privacy and Protection Standards:Â Coursera Instructor Network
- Privacy Law and Data Protection:Â University of Pennsylvania
- IT Fundamentals for Cybersecurity:Â IBM
- Power System: Generation, Transmission and Protection:Â L&T EduTech
- Microsoft Cybersecurity Analyst:Â Microsoft
- Data Privacy Fundamentals:Â Northeastern University
- Introduction to Cybersecurity Fundamentals:Â Coursera Instructor Network