Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "radiation protection"
Skills you'll gain: Business Intelligence, Data Modeling, Dashboard, Database Design, Extract, Transform, Load, Data Integration, Stakeholder Engagement, Data Warehousing, Data Presentation, Performance Tuning, Data Pipelines, Data Visualization Software, Business Reporting, Data Integrity, Business Analytics, Real Time Data, Requirements Elicitation, Scalability, Business Process, Data-Driven Decision-Making
Skills you'll gain: Cloud Computing, Linux, Linux Administration, Cloud Security, Operating Systems, Windows PowerShell, Windows Servers, File Systems, System Configuration, Mac OS, Command-Line Interface, Security Controls, Firewall, Virtualization and Virtual Machines, Containerization, User Accounts
University of Michigan
Skills you'll gain: Stored Procedure, Database Design, SQL, Relational Databases, NoSQL, PostgreSQL, Database Architecture and Administration, Database Theory, Database Management Systems, Data Modeling, JSON, Scalability, Database Management, Query Languages, Cloud Applications, Data Manipulation, Text Mining, Databases, Data Integrity, Data Import/Export
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Intelligence, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Vulnerability Assessments, Encryption, Incident Management, Threat Management, Threat Detection
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Open Web Application Security Project (OWASP), Cyber Operations, Vulnerability Assessments, Security Information and Event Management (SIEM), Test Planning, Network Analysis, Data Integrity
Skills you'll gain: Excel Formulas, Microsoft Excel, Data Cleansing, Data Analysis, Data Import/Export, Spreadsheet Software, Data Wrangling, Data Quality, Pivot Tables And Charts, Google Sheets, Data Manipulation, Data Visualization Software, Information Privacy
Skills you'll gain: Paid media, Instagram, Online Advertising, Social Media, Social Media Campaigns, Advertising Campaigns, Advertising, Digital Advertising, Marketing Materials, Social Media Marketing, Social Media Content, Social Media Strategy, Facebook, Copywriting, Content Creation, Marketing, Information Privacy, Data Collection, Target Audience
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, General Data Protection Regulation (GDPR), Regulatory Compliance, Law, Regulation, and Compliance, Compliance Reporting, Regulation and Legal Compliance, Legal Risk, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Business Ethics, Internal Controls
Skills you'll gain: IT Service Management, Information Technology Infrastructure Library, Cyber Risk, Data Ethics, Cyber Governance, NIST 800-53, Information Technology, Cybersecurity, ISO/IEC 27001, Security Management, Control Objectives for Information and Related Technology (COBIT), Artificial Intelligence, Risk Management Framework, Open Web Application Security Project (OWASP), Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR)
Google
Skills you'll gain: Prompt Engineering, Generative AI, Productivity Software, Artificial Intelligence, Computer Security Awareness Training, Operational Efficiency, Innovation, Human Machine Interfaces, Information Privacy, Machine Learning, Content Creation, Business Ethics
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Personally Identifiable Information, Malware Protection, Threat Management, Email Security
Skills you'll gain: Penetration Testing, Network Security, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Encryption, Malware Protection, Identity and Access Management, Wireless Networks, Data Security, Intrusion Detection and Prevention, Computer Security Awareness Training, Cyber Threat Intelligence
In summary, here are 10 of our most popular radiation protection courses
- Google Business Intelligence:Â Google
- Operating Systems: Overview, Administration, and Security:Â IBM
- PostgreSQL for Everybody:Â University of Michigan
- Cybersecurity Operations Fundamentals:Â Cisco Learning and Certifications
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Excel Basics for Data Analysis:Â IBM
- Fundamentals of Social Media Advertising:Â Meta
- Regulatory Compliance:Â University of Pennsylvania
- Cybersecurity Compliance Framework, Standards & Regulations:Â IBM
- Google AI Essentials:Â Google