• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Protection Schemes

Results for "protection schemes"


  • Status: Free Trial
    Free Trial
    W

    Whizlabs

    AWS: Resilient Solutions and Security Controls

    Skills you'll gain: Amazon Web Services, Disaster Recovery, Amazon Elastic Compute Cloud, Firewall, Network Security, AWS Identity and Access Management (IAM), Cloud Security, Infrastructure As A Service (IaaS), Application Security, Cloud Solutions, Scalability, Security Controls, Network Troubleshooting, Amazon CloudWatch, Network Administration, Virtual Private Networks (VPN), Continuous Deployment

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Exploit Development, Malware, & Defensive Strategies

    Skills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming, Command-Line Interface

    Advanced · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Laravel Protections

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Secure Coding, Application Security, Encryption, Data Security, Database Application, Web Applications, Cryptography, Authentications, Configuration Management, Session Initiation Protocols, Computer Programming

    4.4
    Rating, 4.4 out of 5 stars
    ·
    9 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free
    Free
    G

    Google Cloud

    Enabling Sensitive Data Protection Discovery for BigQuery

    Skills you'll gain: Data Management, Data Loss Prevention, Data Security, Google Cloud Platform, Personally Identifiable Information, Big Data, Identity and Access Management

    Intermediate · Project · Less Than 2 Hours

  • Status: Free
    Free
    G

    Google Cloud

    Enabling Sensitive Data Protection Discovery for Cloud Storage

    Skills you'll gain: Continuous Monitoring, Cloud Security, Cloud Storage, Data Security, Data Loss Prevention, Personally Identifiable Information, Google Cloud Platform, Data Management

    Intermediate · Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Cryptographic Hash and Integrity Protection

    Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications

    4.6
    Rating, 4.6 out of 5 stars
    ·
    92 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Identity Protection and Governance 

    Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Microsoft Azure, Cyber Governance, System Monitoring, Identity and Access Management, Cloud Security, Enterprise Security, Data Security, Authorization (Computing), Multi-Factor Authentication, Security Management, User Accounts, Authentications

    4.6
    Rating, 4.6 out of 5 stars
    ·
    22 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Imperial College London

    Foundations of Public Health Practice: Health Protection

    Skills you'll gain: Microbiology, Public Health and Disease Prevention, Public Health, Sanitation, Infectious Diseases, Environment Health And Safety, Health Education, Epidemiology, Emergency Response, Healthcare Ethics, Community Health, Radiation Protection, Immunology

    4.8
    Rating, 4.8 out of 5 stars
    ·
    121 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Security Foundations, Threats, and Network Protection

    Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework

    4.6
    Rating, 4.6 out of 5 stars
    ·
    9 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Security and Privacy in TOR Network

    Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting

    4.1
    Rating, 4.1 out of 5 stars
    ·
    36 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    B

    Ball State University

    Cybersecurity and Secure Software Design

    Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity

    Build toward a degree

    5
    Rating, 5 out of 5 stars
    ·
    6 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    C

    Codio

    Data Security for Web Developers

    Skills you'll gain: Cryptography, Data Security, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Secure Coding, Public Key Infrastructure, Authentications, Web Development, Application Security, Web Applications, Multi-Factor Authentication, Security Strategy

    4.6
    Rating, 4.6 out of 5 stars
    ·
    7 reviews

    Beginner · Course · 1 - 4 Weeks

Searches related to protection schemes

advanced study of protection schemes and switchgear
1…8910…78

In summary, here are 10 of our most popular protection schemes courses

  • AWS: Resilient Solutions and Security Controls: Whizlabs
  • Exploit Development, Malware, & Defensive Strategies: Packt
  • Laravel Protections: Infosec
  • Enabling Sensitive Data Protection Discovery for BigQuery: Google Cloud
  • Enabling Sensitive Data Protection Discovery for Cloud Storage: Google Cloud
  • Cryptographic Hash and Integrity Protection: University of Colorado System
  • Identity Protection and Governance : Microsoft
  • Foundations of Public Health Practice: Health Protection: Imperial College London
  • Security Foundations, Threats, and Network Protection: Packt
  • Security and Privacy in TOR Network: University of Colorado System

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok