• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Protection Schemes

Results for "protection schemes"


  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Strategies for Cloud Security Risk Management

    Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, NIST 800-53, Infrastructure as Code (IaC), Security Controls, Google Cloud Platform, Cybersecurity, Identity and Access Management

    4.5
    Rating, 4.5 out of 5 stars
    ·
    71 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Security and Privacy in TOR Network

    Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting

    4.1
    Rating, 4.1 out of 5 stars
    ·
    36 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Security Foundations, Threats, and Network Protection

    Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework

    4.6
    Rating, 4.6 out of 5 stars
    ·
    9 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Protection of Information Assets

    Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, Security Controls, Cloud Security, Encryption, Data Security, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Computer Security Incident Management, Information Privacy

    4.7
    Rating, 4.7 out of 5 stars
    ·
    15 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    L

    LearnKartS

    WordPress Website Development Course

    Skills you'll gain: Responsive Web Design, AI Personalization, Web Analytics and SEO, HTML and CSS, Application Security, Cloud Hosting, Control Panels

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    P

    Packt

    AI & Cybersecurity Threats, Global Actors, and Trends

    Skills you'll gain: DevSecOps, Cyber Operations, Threat Modeling, AWS Identity and Access Management (IAM), Zero Trust Network Access, Encryption

    Intermediate · Course · 3 - 6 Months

  • Status: New
    New
    Status: Preview
    Preview
    N

    Northeastern University

    Responsible and Ethical AI

    Skills you'll gain: Responsible AI, Data Ethics, Data Governance, Artificial Intelligence, Dependency Analysis, Information Privacy, Law, Regulation, and Compliance, Personally Identifiable Information, Ethical Standards And Conduct, General Data Protection Regulation (GDPR), Artificial Intelligence and Machine Learning (AI/ML), Data-Driven Decision-Making, Risk Management Framework, Diversity Awareness, Algorithms

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    Q

    Queen Mary University of London

    Cloud Computing Law

    Skills you'll gain: General Data Protection Regulation (GDPR), Cloud Services, Legal Risk, Cloud Computing, Tax, Tax Laws, Law, Regulation, and Compliance, Intellectual Property, Cloud Security, Personally Identifiable Information, Tax Compliance, Data Security, Information Privacy, Regulation and Legal Compliance, Contract Negotiation, Vendor Contracts, Contract Review, Data Governance, Data Access, Cybersecurity

    4.9
    Rating, 4.9 out of 5 stars
    ·
    175 reviews

    Beginner · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    N

    New York University

    Introduction to Cyber Security

    Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Cyber Security Strategy, Data Encryption Standard, Threat Management, Cyber Risk, Mobile Security, Enterprise Security, Computer Security, Threat Detection, Cyber Security Policies

    4.7
    Rating, 4.7 out of 5 stars
    ·
    3.7K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of Michigan

    Introduction to CSS3

    Skills you'll gain: Cascading Style Sheets (CSS), Web Content Accessibility Guidelines, HTML and CSS, Web Design, Hypertext Markup Language (HTML), Web Design and Development, Responsive Web Design, User Interface (UI), Web Development, Javascript, Debugging

    4.8
    Rating, 4.8 out of 5 stars
    ·
    9.6K reviews

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Empower School of Health

    Foundations of Digital Health & Ethical Aspects

    Skills you'll gain: Health Technology, Healthcare Ethics, Data Ethics, Telehealth, Medical Privacy, Surgery, Health Informatics, Health Disparities, Health Care Procedure and Regulation, Ethical Standards And Conduct, Health Care Administration, Public Health, Public Health and Disease Prevention, Regulation and Legal Compliance, Information Privacy, Health Equity, Medical Equipment and Technology, Informed Consent, Health Policy, Digital Transformation

    Intermediate · Specialization · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    EDUCBA

    Advanced Penetration Testing with Kali Linux

    Skills you'll gain: Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Mobile Security, Cyber Operations, Scripting, Android (Operating System), Command-Line Interface, Authentications, Network Analysis, Automation, Virtual Environment

    Mixed · Course · 1 - 4 Weeks

Searches related to protection schemes

advanced study of protection schemes and switchgear
1…91011…78

In summary, here are 10 of our most popular protection schemes courses

  • Strategies for Cloud Security Risk Management: Google Cloud
  • Security and Privacy in TOR Network: University of Colorado System
  • Security Foundations, Threats, and Network Protection: Packt
  • Protection of Information Assets: Packt
  • WordPress Website Development Course: LearnKartS
  • AI & Cybersecurity Threats, Global Actors, and Trends: Packt
  • Responsible and Ethical AI: Northeastern University
  • Cloud Computing Law: Queen Mary University of London
  • Introduction to Cyber Security: New York University
  • Introduction to CSS3: University of Michigan

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok