Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "radiation protection"
Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Computer Security, Threat Modeling, Cybersecurity, Vulnerability Assessments, Network Security, Cyber Security Strategy, Security Controls, Information Assurance, Data Security, Cyber Security Assessment, Cyber Risk, Data Integrity, Identity and Access Management
Skills you'll gain: Database Design, Power BI, Dashboard, Data Modeling, Business Intelligence, Microsoft SQL Servers, Transact-SQL, Relational Databases, Data Warehousing, Data Visualization Software, SQL, Business Analytics, Advanced Analytics, Data Integrity
Institut Mines-Télécom
Skills you'll gain: Threat Modeling, Threat Detection, Security Requirements Analysis, Cybersecurity, Cyber Attacks, Application Security, Network Security, Security Testing, Vulnerability Assessments, Secure Coding, SQL
- Status: New
University of California, Davis
Skills you'll gain: Large Language Modeling, Generative AI, Writing, Data Ethics, Prompt Engineering, Artificial Intelligence, Technical Writing, Machine Learning, Information Privacy
Board Infinity
Skills you'll gain: Teradata SQL, Transaction Processing, Data Security, SQL, Query Languages, Database Management, Data Management, Stored Procedure, Data Access, Performance Tuning, Data Integrity, Data Dictionary
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Information Privacy, Safety and Security, Multi-Factor Authentication
Skills you'll gain: Salesforce Development, Salesforce, ChatGPT, Data Validation, Productivity Software, Microsoft Power Automate/Flow, Code Coverage, User Flows, Data Integrity, Verification And Validation, Unit Testing, Data Quality
Skills you'll gain: Incident Response, Computer Security Incident Management, Cybersecurity, Google Cloud Platform, Malware Protection, Threat Detection, Security Information and Event Management (SIEM)
- Status: New
University of Maryland, College Park
Skills you'll gain: Online Advertising, Data Presentation, Data Visualization, Digital Advertising, Advertising, Analytics, Big Data, Social Media Strategy, Social Media, Data Ethics, Marketing, Social Media Marketing, Data-Driven Decision-Making, Return On Investment, Trend Analysis, Customer Engagement, Information Privacy
- Status: New
Skills you'll gain: Incident Response, Vulnerability Scanning, Cyber Threat Intelligence, Computer Security Incident Management, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Penetration Testing, Threat Detection, Intrusion Detection and Prevention, Threat Modeling, Security Testing, Security Management, Application Security, Network Security, Event Monitoring, Malware Protection, Network Analysis
University of Michigan
Skills you'll gain: Automation, Socioeconomics, Environmental Issue, Economics, Policy, and Social Studies, Emerging Technologies, Transportation Operations, Social Sciences, Electric Power Systems, Technology Solutions, Augmented and Virtual Reality (AR/VR), Environment and Resource Management, Safety and Security, Information Privacy, Artificial Intelligence
- Status: New
Skills you'll gain: Incident Response, Cybersecurity, Risk Management, Cyber Security Assessment, Cyber Governance, Secure Coding, Malware Protection, Threat Modeling, Governance Risk Management and Compliance, Application Security, Threat Detection, Compliance Management, Data Security, Penetration Testing, Infrastructure Security
In summary, here are 10 of our most popular radiation protection courses
- Fundamentals of Information System Security Architecture:Â LearnQuest
- Database Design and Operational Business Intelligence:Â Edureka
- Cybersécurité : comment sécuriser un site web: Institut Mines-Télécom
- Writing with Generative AI:Â University of California, Davis
- Teradata SQL and Data Management:Â Board Infinity
- Cybersecurity: What to Do When You Are a Victim:Â Kennesaw State University
- ChatGPT for Salesforce Development:Â Packt
- Responding to Post-Intrusion Ransomware with Cortex XSOAR:Â Google Cloud
- Online Advertising & Social Media:Â University of Maryland, College Park
- CyberSec First Responder (CFR-310):Â Packt