Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "endpoint protection"
University of Colorado System
Skills you'll gain: Infrastructure Security, Cyber Risk, Cyber Security Policies, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Risk Management Framework, Technology Roadmaps, Network Infrastructure, Transportation Operations, Infrastructure Architecture
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
- Status: Free
Universiteit Leiden
Skills you'll gain: Law, Regulation, and Compliance, International Relations, Conflict Management, Child Welfare, Ethical Standards And Conduct, Disabilities, Journalism
Queen Mary University of London
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Cloud Security, Personally Identifiable Information, Data Security, Regulation and Legal Compliance, Information Privacy, Cybersecurity, Cloud Services, Cloud Computing, Data Governance, Data Sharing
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Infrastructure Security, Firewall, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, System Configuration
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Threat Modeling, Personally Identifiable Information, Malware Protection, Email Security, Incident Response
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Vulnerability Scanning, Encryption, Key Management, Virtual Machines
- Status: Free
University of Geneva
Skills you'll gain: Social Justice, Disabilities, International Relations, Law, Regulation, and Compliance, Human Services, Diversity Awareness, Regulation and Legal Compliance, Environmental Issue, Political Sciences, Diplomacy, Cultural Diversity, Ethical Standards And Conduct, Policy Analysis, Economics, Policy, and Social Studies, Investigation, Research Methodologies, Governance
Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Microsoft Azure, System Monitoring, Identity and Access Management, Cloud Security, Enterprise Security, Data Governance, Authorization (Computing), User Provisioning, Multi-Factor Authentication, Authentications
New York University
Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
In summary, here are 10 of our most popular endpoint protection courses
- Cybersecurity Policy for Aviation and Internet Infrastructures:Â University of Colorado System
- Operating Systems: Overview, Administration, and Security:Â IBM
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- International Humanitarian Law in Theory and Practice :Â Universiteit Leiden
- Cloud Computing Law: Data Protection and Cybersecurity:Â Queen Mary University of London
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks
- Introduction to Cybersecurity Fundamentals:Â Coursera Instructor Network
- Security Best Practices in Google Cloud:Â Google Cloud
- Introduction aux Droits de l’Homme: University of Geneva