Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Data Security Course Catalog
- Status: Free Trial
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Security Awareness, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security)
- Status: Free Trial
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
- Status: Free Trial
Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Zero Trust Network Access, Cybersecurity, Threat Modeling, Network Security, Infrastructure Security, Threat Detection, Mobile Security, Disaster Recovery, Authentications
- Status: Free Trial
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Malware Protection, Endpoint Security, Network Security, Firewall
Coursera Project Network
Skills you'll gain: Microsoft SQL Servers, Data Security, Microsoft Azure, Cloud Security, Database Management, Data Management, Data Access, Role-Based Access Control (RBAC)
- Status: Free Trial
Skills you'll gain:
- Status: Free
Skills you'll gain: Continuous Monitoring, Cloud Security, Cloud Storage, Data Security, Data Loss Prevention, Personally Identifiable Information, Google Cloud Platform, Data Management
- Status: Free
Skills you'll gain: Data Loss Prevention, Generative AI, Personally Identifiable Information, Cloud API, Jupyter, Google Cloud Platform, Data Security, Scripting Languages
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Mobile Security, Investigation, Criminal Investigation and Forensics, Mobile Development, Android (Operating System), Application Security, Apple iOS, Legal Proceedings, Computer Security, Malware Protection, File Systems, Cybersecurity, Secure Coding, Computer Security Incident Management, Cloud Security, Analysis, Disaster Recovery, Security Strategy, Debugging, Encryption
Google Cloud
Skills you'll gain: Data Loss Prevention, Personally Identifiable Information, Information Privacy, JSON, Data Security, Cloud API, Google Cloud Platform, Data Cleansing, Unstructured Data, Cloud Storage
- Status: Free Trial
Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Application Security, OSI Models, Cryptography, Encryption, Endpoint Security, Firewall, Malware Protection, Wireless Networks, Network Protocols, Public Key Infrastructure, Data Integrity, Virtualization
- Status: Free Trial
Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, Security Controls, Cloud Security, Encryption, Data Security, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Computer Security Incident Management, Information Privacy
Data Security learners also search
In summary, here are 10 of our most popular data security courses
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Cloud Security Risks: Identify and Protect Against Threats:Â Google Cloud
- Cloud Security, Resiliency, and Vulnerability Management:Â Packt
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- Data Management with Azure: Implement Compliance Controls:Â Coursera Project Network
- Information Technology and Security Principles:Â Packt
- Enabling Sensitive Data Protection Discovery for Cloud Storage:Â Google Cloud
- Protecting Sensitive Data in Gen AI Model Responses:Â Google Cloud
- Mobile Security:Â Macquarie University
- Data Loss Prevention: Qwik Start - JSON:Â Google Cloud