Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "endpoint protection"
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Skills you'll gain: Data Import/Export, Object Oriented Programming (OOP), C++ (Programming Language), Data Validation, Object Oriented Design, Programming Principles, Data Integrity, Data Structures, Computer Programming, File Management, Integrated Development Environments, Computer Science, Pseudocode, Data Storage
- Status: New
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Crisis Management, Incident Response, OpenAI, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Threat Management, Expense Management, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Creative Thinking, Creativity
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Microsoft Azure, System Monitoring, Identity and Access Management, Cloud Security, Enterprise Security, Data Governance, Authorization (Computing), User Provisioning, Multi-Factor Authentication, Authentications
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
University at Buffalo
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Network Protocols, FinTech, Virtual Environment, Data Integrity, Emerging Technologies, Data Security, Data Validation, User Accounts
Skills you'll gain: Stakeholder Communications, Incident Response, Stakeholder Engagement, Computer Security Incident Management, Data Ethics, Cybersecurity, Security Awareness, Incident Management, Data Security, Communication, Asset Protection, Ethical Standards And Conduct, Business Ethics, Interviewing Skills, Professional Networking
Skills you'll gain: Instagram, Social Media, Advertising Campaigns, Advertising, Marketing Materials, Social Media Marketing, Social Media Content, Social Media Strategy, Facebook, Copywriting, Content Creation, Marketing, Information Privacy, Campaign Management, Data Collection, Target Audience
Skills you'll gain: Data Collection, Marketing, Marketing Analytics, Google Analytics, Digital Marketing, Application Programming Interface (API), Personally Identifiable Information, Marketing Strategies, Web Analytics, Information Privacy, Regulation and Legal Compliance, Facebook, Data-Driven Decision-Making, Advertising
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Vulnerability Scanning, Encryption, Key Management, Virtual Machines
DeepLearning.AI
Skills you'll gain: Generative AI, PyTorch (Machine Learning Library), Image Analysis, Deep Learning, Artificial Neural Networks, Data Ethics, Applied Machine Learning, Computer Vision, Machine Learning, Computer Graphics, Computer Graphic Techniques, Artificial Intelligence and Machine Learning (AI/ML), Information Privacy, Data Synthesis
In summary, here are 10 of our most popular endpoint protection courses
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Programming in C++: A Hands-on Introduction:Â Codio
- Generative AI Cybersecurity & Privacy for Leaders:Â Vanderbilt University
- IT Fundamentals for Cybersecurity:Â IBM
- Identity Protection and Governance : Microsoft
- Assets, Threats, and Vulnerabilities:Â Google
- Blockchain Basics:Â University at Buffalo
- Put It to Work: Prepare for Cybersecurity Jobs:Â Google
- Fundamentals of Social Media Advertising:Â Meta
- Marketing Analytics Foundation:Â Meta