Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "data protection and encryption"
Skills you'll gain: React Native, Android Studio, Restful API, Version Control, User Research, UI/UX Research, Usability Testing, Git (Version Control System), Data Structures, Jest (JavaScript Testing Framework), Unix Commands, Android Jetpack, Android Development, Persona (User Experience), GitHub, Interaction Design, Kotlin, User Experience Design, User Interface and User Experience (UI/UX) Design, Mobile Development
Skills you'll gain: Search Engine Marketing, Search Engine Optimization, Target Audience, Digital Marketing, Persona Development, Web Analytics and SEO, Marketing, Customer Engagement, Customer Acquisition Management, Advertising, Marketing Strategies, Lead Generation
- Status: Free
Princeton University
Skills you'll gain: Blockchain, Cryptography, Encryption, Payment Systems, FinTech, Key Management, Digital Assets, Network Protocols, Cybersecurity, Transaction Processing, Distributed Computing, Emerging Technologies, Scripting, Financial Regulation, Public Affairs, Market Dynamics
University of Michigan
Skills you'll gain: Relational Databases, Database Design, SQL, Databases, Web Scraping, Data Modeling, Database Management, Data Visualization Software, Object Oriented Programming (OOP), Data Processing, Data Storage, Python Programming, Application Programming Interface (API)
University of California, Irvine
Skills you'll gain: Grammar, Peer Review, Writing, Research, Research Methodologies, Report Writing, Research Design, Editing, Writing and Editing, Data Collection, Vocabulary, Timelines, Style Guides
Board Infinity
Skills you'll gain: Teradata SQL, Transaction Processing, Data Security, SQL, Query Languages, Database Management, Data Management, Data Access, Performance Tuning, Authorization (Computing), Data Integrity, Role-Based Access Control (RBAC), Data Dictionary
Wesleyan University
Skills you'll gain: Descriptive Statistics, Data Manipulation, Data Presentation, Data Management, Graphing, SAS (Software), Peer Review, Data Analysis, Statistics, Business Research, Statistical Methods, Research Reports, Exploratory Data Analysis, Computer Programming, Python Programming
University of Michigan
Skills you'll gain: Debugging, Python Programming, Data Structures, Computer Programming, Computer Graphics, Graphical Tools, Computational Thinking
University of California, Irvine
Skills you'll gain: Cost Estimation, Stakeholder Management, Project Risk Management, Project Schedules, Work Breakdown Structure, Project Performance, Estimation, Conflict Management, Risk Analysis, Quality Management, Project Management, Timelines, Milestones (Project Management), Cost Management, Peer Review, Project Planning, Budgeting, Project Management Life Cycle, Scope Management, Change Management
Skills you'll gain: AWS CloudFormation, Amazon CloudWatch, Cloud Security, Data Security, Amazon Web Services, Infrastructure as Code (IaC), Data Governance, AWS Identity and Access Management (IAM), Cyber Governance, Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Key Management, Security Controls, Amazon S3, Cryptography, System Monitoring, Configuration Management, System Configuration
Vanderbilt University
Skills you'll gain: ChatGPT, Ideation, Verification And Validation, Succession Planning, Business Writing, Generative AI, Leadership, Meeting Facilitation, Organizational Leadership, Creative Thinking, Creativity, Strategic Leadership, Artificial Intelligence, Business Leadership, Proposal Writing, Thought Leadership, Communication, Risk Management Framework, OpenAI, Natural Language Processing
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
In summary, here are 10 of our most popular data protection and encryption courses
- Meta Android Developer: Meta
- Attract and Engage Customers with Digital Marketing: Google
- Bitcoin and Cryptocurrency Technologies: Princeton University
- Using Databases with Python: University of Michigan
- Academic English: Writing: University of California, Irvine
- Teradata SQL and Data Management: Board Infinity
- Data Management and Visualization: Wesleyan University
- Python Basics: University of Michigan
- Project Management Principles and Practices: University of California, Irvine
- AWS: Security, Governance, and Compliance: Whizlabs