Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "data breach"
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Visualization, Statistical Programming, Ggplot2, Dimensionality Reduction, Data Visualization Software, Data Integration, Knitr, Data Analysis, Data Import/Export, General Science and Research, Data Sharing, Statistical Reporting
- Status: Free
Northeastern University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Ethics, Law, Regulation, and Compliance, Data Security, Journalism, Emerging Technologies, Digital Communications, Data Collection, Internet Of Things, Machine Learning, Artificial Intelligence
Johns Hopkins University
Skills you'll gain: Rmarkdown, Version Control, Data Science, General Science and Research, Data Analysis, R Programming, Statistical Programming, Exploratory Data Analysis, Software Installation
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Johns Hopkins University
Skills you'll gain: Statistical Analysis, R Programming, Statistical Programming, Data Analysis, Debugging, Simulations, Program Development, Software Installation, Computer Programming, Data Structures, Performance Tuning, Data Import/Export
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Presentation, Data Governance, Data Security, Data Migration, Database Design, Data Visualization, Interactive Data Visualization, Descriptive Statistics, Data Mining, Cloud Storage, Data Visualization Software, Extract, Transform, Load, IBM DB2, Data Management, MySQL, Excel Formulas
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Johns Hopkins University
Skills you'll gain: Data Manipulation, Data Cleansing, Data Integration, Data Import/Export, Data Collection, Data Management, Web Scraping, R Programming, MySQL, Application Programming Interface (API)
Skills you'll gain: NoSQL, Data Warehousing, SQL, Apache Hadoop, Extract, Transform, Load, Apache Airflow, Data Security, Linux Commands, Data Migration, Database Design, Data Governance, MySQL, Apache Spark, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Cloud Storage
Skills you'll gain: Jupyter, Automation, Web Scraping, Python Programming, Data Manipulation, Data Import/Export, Scripting, Data Structures, Data Processing, Data Collection, Application Programming Interface (API), Pandas (Python Package), Programming Principles, NumPy, Object Oriented Programming (OOP), Computer Programming
Skills you'll gain: Big Data, Data Analysis, Statistical Analysis, Apache Hadoop, Apache Hive, Data Collection, Data Mart, Data Warehousing, Data Storytelling, Apache Spark, Data Cleansing, Data Lakes, Data Visualization Software, SQL
University of Michigan
Skills you'll gain: Data Structures, Python Programming, Data Manipulation, Development Environment, File Management, Data Analysis, Computer Programming, Software Installation
In summary, here are 10 of our most popular data breach courses
- Data Science: Foundations using R: Johns Hopkins University
- Data Privacy Fundamentals: Northeastern University
- The Data Scientist’s Toolbox: Johns Hopkins University
- Introduction to Cybersecurity Tools & Cyberattacks: IBM
- R Programming: Johns Hopkins University
- IBM Data Management: IBM
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Getting and Cleaning Data: Johns Hopkins University
- IBM Data Architect: IBM
- Python for Data Science, AI & Development: IBM