Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "radiation protection"
Illinois Tech
Skills you'll gain: Cloud Security, Identity and Access Management, AWS Identity and Access Management (IAM), Incident Response, Cloud Computing, Cloud Computing Architecture, Data Security, Application Security, Network Security, Encryption, Role-Based Access Control (RBAC), Amazon Web Services, Key Management, Infrastructure Security, Security Controls, Firewall, Continuous Monitoring, Multi-Factor Authentication
- Status: New
Skills you'll gain: Incident Response, Cybersecurity, Risk Management, Cyber Security Assessment, Cyber Governance, Secure Coding, Malware Protection, Threat Modeling, Governance Risk Management and Compliance, Application Security, Threat Detection, Compliance Management, Data Security, Penetration Testing, Infrastructure Security
- Status: New
Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Wireless Networks, Splunk, Information Privacy
Kennesaw State University
Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Data Security, Security Awareness, Information Privacy, Encryption
Coursera Project Network
Skills you'll gain: Pinterest, User Accounts, Social Media Management, Social Media, Account Management, Advertising, Information Privacy, Online Advertising, Branding, Digital Advertising, System Configuration, Payment Systems
- Status: New
Skills you'll gain: Operating Systems, Databases, Software Development, Information Technology, Collaborative Software, Network Troubleshooting, Desktop Support, Network Security, General Networking, Network Administration, Data Storage, Hardware Troubleshooting, Technical Support and Services, System Configuration, Computer Hardware, Application Security, File Management, Computer Security Awareness Training, Software Installation, Peripheral Devices
O.P. Jindal Global University
Skills you'll gain: Digital Transformation, Economics, Policy, and Social Studies, Market Dynamics, E-Commerce, Economics, FinTech, Policty Analysis, Research, and Development, Technology Strategies, Innovation, Governance, Emerging Technologies, Cybersecurity, Information Privacy
- Status: NewStatus: Free
Coursera Instructor Network
Skills you'll gain: Data Ethics, Generative AI Agents, Marketing Management, AI Personalization, Marketing Strategies, Marketing, Business Ethics, Ethical Standards And Conduct, Marketing Effectiveness, Marketing Automation, Marketing Psychology, Marketing Analytics, Information Privacy, Law, Regulation, and Compliance
Northeastern University
Skills you'll gain: Law, Regulation, and Compliance, Data Ethics, Artificial Intelligence, Research, Regulation and Legal Compliance, Artificial Intelligence and Machine Learning (AI/ML), General Data Protection Regulation (GDPR), Ethical Standards And Conduct, Research Methodologies, Governance
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Threat Management, Threat Detection, Cyber Security Policies, Intrusion Detection and Prevention, Network Troubleshooting, Firewall, Security Management, Infrastructure Security, Network Administration, System Configuration, Software Installation, System Implementation
- Status: New
Institut Mines-Télécom
Skills you'll gain: Safety and Security, Emerging Technologies, Digital Communications, Digital Transformation, Cybersecurity, Communication, Technology Strategies, Innovation, Digital Content, Law, Regulation, and Compliance, Competitive Intelligence, Information Privacy, Ethical Standards And Conduct
- Status: New
Skills you'll gain: Data Ethics, Generative AI, Large Language Modeling, Artificial Intelligence, PyTorch (Machine Learning Library), MLOps (Machine Learning Operations), Tensorflow, Information Privacy, A/B Testing, Natural Language Processing, Deep Learning, Version Control, Application Deployment, Performance Tuning, Scalability
In summary, here are 10 of our most popular radiation protection courses
- Cloud Computing Security - Master's:Â Illinois Tech
- Incident Response, Risk Management, and Compliance:Â Packt
- Advanced Network Security and Analysis:Â Johns Hopkins University
- Cybersecurity: Protecting your Information on the Go:Â Kennesaw State University
- Create and Edit a Pinterest Ad Account:Â Coursera Project Network
- TOTAL - CompTIA Tech+ (FC0-U71):Â Packt
- Indian Economy in a Digital World:Â O.P. Jindal Global University
- GenAI for Marketing: Ethics and Trends:Â Coursera Instructor Network
- Ethics and AI: A Philosophical Guide to Responsible Use:Â Northeastern University
- Check Point Jump Start: Quantum Management:Â Check Point Software Technologies Ltd.