Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "radiation protection"
University of Michigan
Skills you'll gain: Stored Procedure, Database Design, SQL, Relational Databases, NoSQL, PostgreSQL, Database Architecture and Administration, Database Theory, Database Management Systems, Data Modeling, JSON, Scalability, Database Management, Query Languages, Cloud Applications, Data Manipulation, Text Mining, Databases, Data Integrity, Data Import/Export
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Information Systems Security, Intrusion Detection and Prevention, Endpoint Security, Network Infrastructure, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
Skills you'll gain: Prompt Engineering, ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Large Language Modeling, Artificial Intelligence, Natural Language Processing, Program Development, Anomaly Detection, Vulnerability Management, Image Analysis, Content Creation, Virtual Environment
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Infrastructure Security, Authorization (Computing), Multi-Factor Authentication
Johns Hopkins University
Skills you'll gain: Clinical Data Management, Clinical Trials, Sample Size Determination, Clinical Research, Data Quality, Healthcare Ethics, Quality Assurance, Data Cleansing, Regulatory Compliance, Data Integrity, Data Governance, Microsoft Excel, Statistical Reporting, Data Compilation, Data Collection, Scientific Methods, Biostatistics, Data Sharing, Statistical Analysis, Patient Safety
Skills you'll gain: Cybersecurity, Encryption, Cyber Attacks, Email Security, Computer Security Awareness Training, Security Awareness, Data Security, Network Security, Malware Protection, Authentications, Authorization (Computing), Security Controls, Hardening, Identity and Access Management, Information Privacy, Multi-Factor Authentication, System Configuration
- Status: Free
Northeastern University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Ethics, Law, Regulation, and Compliance, Journalism, Emerging Technologies, Media and Communications, Internet Of Things, Artificial Intelligence
Skills you'll gain: Business Intelligence, Data Modeling, Dashboard, Database Design, Extract, Transform, Load, Data Integration, Stakeholder Engagement, Data Warehousing, Data Presentation, Performance Tuning, Data Pipelines, Data Visualization Software, Business Reporting, Data Integrity, Business Analytics, Real Time Data, Requirements Elicitation, Scalability, Business Process, Data-Driven Decision-Making
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Intelligence, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Vulnerability Assessments, Encryption, Incident Management, Threat Management, Threat Detection
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Open Web Application Security Project (OWASP), Cyber Operations, Vulnerability Assessments, Security Information and Event Management (SIEM), Test Planning, Network Analysis, Data Integrity
Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Prompt Engineering, Network Monitoring, Cloud Computing Architecture, Containerization, Network Architecture, Role-Based Access Control (RBAC), Network Security, OAuth, Network Routing, Cloud Security, Virtual Private Networks (VPN)
Skills you'll gain: Blockchain, FinTech, Emerging Technologies, Cryptography, Digital Assets, Distributed Computing, Digital Transformation, Public Key Cryptography Standards (PKCS), Transaction Processing, Information Privacy, Governance, Network Security, Data Integrity, Financial Services
In summary, here are 10 of our most popular radiation protection courses
- PostgreSQL for Everybody:Â University of Michigan
- Computer Networks and Network Security:Â IBM
- IBM Generative AI for Cybersecurity Professionals:Â IBM
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Clinical Trials Operations:Â Johns Hopkins University
- Introduction to Cybersecurity Essentials:Â IBM
- Data Privacy Fundamentals:Â Northeastern University
- Google Business Intelligence:Â Google
- Cybersecurity Operations Fundamentals:Â Cisco Learning and Certifications
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM