Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security policies"
Skills you'll gain: Generative AI, Google Cloud Platform, Cybersecurity, Cloud Security, Artificial Intelligence
Kennesaw State University
Skills you'll gain: Cyber Governance, Risk Management Framework, Risk Analysis, Risk Management, Threat Detection, Threat Management, Business Risk Management, Cyber Risk, Security Management, Governance, Cybersecurity, Cyber Security Strategy, Security Strategy, Asset Management
Akamai Technologies, Inc.
Skills you'll gain: Linux, Linux Administration, Linux Servers, File Systems, Linux Commands, Operating Systems, User Accounts, OS Process Management, File Management, Unix Shell, Unix Commands, System Configuration, Authorization (Computing), Command-Line Interface, Open Source Technology, Systems Administration, Virtualization, Virtual Machines
- Status: Free
Skills you'll gain: Unified Modeling Language, Systems Development Life Cycle, Embedded Systems, Internet Of Things, Software Development Life Cycle, Application Lifecycle Management, Systems Architecture, Systems Development, Software Architecture, System Design and Implementation, Technical Design, Software Design, Systems Engineering, System Requirements, Prototyping, Requirements Analysis, Real Time Data
Imperial College London
Skills you'll gain: Health Systems, Health Assessment, Health Care Administration, Health Care, Governance, Healthcare Industry Knowledge, Primary Care, Policy Analysis, Public Policies, Program Evaluation, Policy Development, Policty Analysis, Research, and Development, Human Services, Economics, Policy, and Social Studies, Research
Google
Skills you'll gain: IT Security Architecture, Package and Software Management, IT Infrastructure, Network Troubleshooting, Systems Administration, Computer Networking, Infrastructure Security, Encryption, Data Security, Desktop Support, Network Security, Routing Protocols, TCP/IP, Lightweight Directory Access Protocols, Microsoft Windows, Technical Support, Active Directory, Software Installation, Computer Hardware, End User Training and Support
Skills you'll gain: Cloud Security, Identity and Access Management, Authorization (Computing), Payment Card Industry (PCI) Data Security Standards, Data Security, Security Engineering, Cloud Standards, Security Controls, DevOps, Cloud Computing Architecture, Network Security, Encryption, Firewall, Enterprise Security, CI/CD, Key Management
University of California, Irvine
Skills you'll gain: Test Planning, Embedded Software, Embedded Systems, Functional Requirement, Requirements Analysis, System Design and Implementation, Development Testing, Software Design, Prototyping, Systems Engineering, C and C++
Skills you'll gain: Data Management, Artificial Intelligence and Machine Learning (AI/ML), Infrastructure Architecture, Data Infrastructure, MLOps (Machine Learning Operations), Application Deployment, Data Cleansing, Artificial Intelligence, Continuous Deployment, Data Security, Application Frameworks, PyTorch (Machine Learning Library), Machine Learning, Tensorflow, Applied Machine Learning, Data Pipelines, Scikit Learn (Machine Learning Library), Scalability, Feature Engineering, Version Control
Board Infinity
Skills you'll gain: Spring Boot, Restful API, Model View Controller, Spring Framework, Java, Java Programming, Web Services, Back-End Web Development, Data Structures, Application Security, Application Development
Skills you'll gain: Blockchain, Digital Assets, Transportation, Supply Chain, and Logistics, Plan Execution, Supply Chain, Governance, Supply Chain Management, Business Transformation, FinTech, Supply Chain Systems, Business Analysis, Market Opportunities, Competitive Analysis, Interoperability, Business Leadership, Strategic Partnership, Operational Analysis, Emerging Technologies, Logistics, E-Commerce
Skills you'll gain: Azure Active Directory, Active Directory, Microsoft Azure, Multi-Factor Authentication, Authentications, User Accounts, Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, Cloud Security, Single Sign-On (SSO), Hybrid Cloud Computing, Self Service Technologies
In summary, here are 10 of our most popular security policies courses
- Put It All Together: Prepare for a Cloud Security Analyst Job: Google Cloud
- Implementing a Risk Management Framework : Kennesaw State University
- Operating Systems Fundamentals: Akamai Technologies, Inc.
- Introduction to Architecting Smart IoT Devices: EIT Digital
- Health Systems Development: Imperial College London
- IT-поддержка Google: Google
- Preparing for Your Professional Cloud Security Engineer Journey: Google Cloud
- Programming for the Internet of Things Project: University of California, Irvine
- Foundations of AI and Machine Learning: Microsoft
- Data Structures & Backend with Java: Board Infinity