Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "protection contre les logiciels malveillants"

Skills you'll gain: Responsible AI, Information Privacy, Cloud Security, Generative AI, Google Cloud Platform, Data Security, Data Ethics, Application Security, Data Governance, Artificial Intelligence, Machine Learning
Status: PreviewUniversity of Geneva
Skills you'll gain: Water Resources, Water Resource Management, Climate Change Adaptation, Water Sustainability, Arbitration, Mediation, Environmental Laws, International Relations, Environmental Regulations, Conflict Management, Case Law
Status: PreviewUniversity of Pennsylvania
Skills you'll gain: Advocacy, Immigration Law, Community and Social Work, Human Services, Social Justice, World History, Legal Research, Legal Proceedings, International Relations, Mental Health Diseases and Disorders, Case Studies
Status: PreviewInstitut Mines-Télécom
Skills you'll gain: Image Analysis, Computer Vision, Image Quality, Data Processing, Computer Programming, Medical Imaging, Python Programming, Mathematical Modeling, Histogram, Algorithms, Machine Learning Algorithms
- Status: Preview
The World Bank Group
Skills you'll gain: Contract Management, Procurement, Project Finance, Stakeholder Engagement, Contract Negotiation, Risk Management, Governance, Sustainable Systems, Strategic Partnership, Public Policies, Feasibility Studies, Project Implementation, Case Studies
 
Status: Free TrialUniversity of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Malware Protection, Endpoint Security, Network Security, Firewall
Status: PreviewInstitut Mines-Télécom
Skills you'll gain: Image Analysis, Computer Vision, Python Programming, Pandas (Python Package), Computer Programming, Medical Imaging, Jupyter, Algorithms, Plot (Graphics), Debugging, Applied Mathematics, Data Import/Export
Status: Free TrialUniversity of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications
Status: Free TrialUniversity of Pennsylvania
Skills you'll gain: Health Insurance Portability And Accountability Act (HIPAA) Compliance, General Data Protection Regulation (GDPR), Medical Privacy, Information Privacy, Personally Identifiable Information, Regulatory Compliance, Data Security, Data Management, Data Sharing, Incident Response, Governance, Risk Management
Status: Free TrialInfosec
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Secure Coding, Application Security, Encryption, Data Security, Database Application, Web Applications, Cryptography, Authentications, Configuration Management, Session Initiation Protocols, Computer Programming
Status: NewStatus: Free TrialSkills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming, Command-Line Interface
Status: PreviewInstitut Mines-Télécom
Skills you'll gain: Image Analysis, Computer Vision, NumPy, Python Programming, Scientific Visualization, Mathematical Modeling, Applied Mathematics
In summary, here are 10 of our most popular protection contre les logiciels malveillants courses
- Responsible AI for Developers: Privacy & Safety - Français: Google Cloud
 - Droit International de l'Eau Douce: University of Geneva
 - Refugee & Asylum Advocacy: Legal Frameworks for Protection: University of Pennsylvania
 - Traitement d'images : segmentation et caractérisation: Institut Mines-Télécom
 - Les Partenariats Public-Privé (PPP): Comment offrir de meilleures infrastructures pour les services publics: The World Bank Group
 - Detecting and Mitigating Cyber Threats and Attacks: University of Colorado System
 - Traitement d'images : introduction au filtrage: Institut Mines-Télécom
 - Cryptographic Hash and Integrity Protection: University of Colorado System
 - Privacy Law and Data Protection: University of Pennsylvania
 - Laravel Protections: Infosec
 










