Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security policies"
Skills you'll gain: Data Management, Artificial Intelligence and Machine Learning (AI/ML), Infrastructure Architecture, Data Infrastructure, MLOps (Machine Learning Operations), Application Deployment, Data Cleansing, Artificial Intelligence, Continuous Deployment, Data Security, Application Frameworks, PyTorch (Machine Learning Library), Machine Learning, Tensorflow, Applied Machine Learning, Data Pipelines, Scikit Learn (Machine Learning Library), Scalability, Feature Engineering, Version Control
- Status: Free
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Security Testing, Network Security, Network Monitoring, Operating Systems
University of Colorado System
Skills you'll gain: Requirements Analysis, User Requirements Documents, Requirements Elicitation, Agile Methodology, Functional Requirement, Software Documentation, System Requirements, Software Development Life Cycle, Agile Software Development, Waterfall Methodology, Technical Communication
Universidad de los Andes
Skills you'll gain: Social Justice, Political Sciences, Economics, Policy, and Social Studies, Community Organizing, Advocacy, Public Policies, Human Services, Governance, Cultural Diversity, International Relations
Skills you'll gain: Azure Active Directory, Active Directory, Microsoft Azure, Multi-Factor Authentication, Authentications, User Accounts, Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, Cloud Security, Single Sign-On (SSO), Hybrid Cloud Computing, Self Service Technologies
Skills you'll gain: Cryptography, Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Threat Modeling, Simple Object Access Protocol (SOAP), TCP/IP, Web Applications, Restful API
University of Michigan
Skills you'll gain: Data Visualization, Exploratory Data Analysis, Plot (Graphics), Statistical Analysis, Ggplot2, Program Evaluation, Policy Analysis, Data Ethics, Survey Creation, Data Analysis, Tidyverse (R Package), Statistical Visualization, R Programming, Statistical Methods, Public Policies, Data Visualization Software, Statistical Hypothesis Testing, Analytical Skills, Scatter Plots, Political Sciences
Skills you'll gain: Data Governance, Data Management, Information Management, Metadata Management, Data Strategy, Governance, Data Integrity, Cloud Management, Regulatory Requirements, Compliance Management, Data Quality, Data Security, Cloud Solutions
Google Cloud
Skills you'll gain: Google Cloud Platform, Kubernetes, Generative AI, Big Data, Software Development Life Cycle, Cloud Computing, DevOps, Cloud Security, Development Testing, Application Deployment, Marketing Analytics, Software Development Tools, Cloud Development, Application Development, Network Planning And Design, Software Development, Data Analysis, Infrastructure as Code (IaC), CI/CD, Cloud Applications
Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Computer Security Incident Management, Data Security, Vulnerability Assessments, Application Security, Threat Detection, Cybersecurity, Security Controls, Security Requirements Analysis, Continuous Monitoring, Cyber Security Assessment, Security Software, Security Strategy, Telecommuting, Infrastructure Security, Cyber Security Policies
Duke University
Skills you'll gain: Loans, Lending and Underwriting, Blockchain, General Lending, Consumer Lending, Derivatives, Credit Risk, FinTech, Financial Systems, Market Liquidity, Financial Trading, Futures Exchange, Securities (Finance), Digital Assets, Finance, Liquidation, Market Data, Transaction Processing, Asset Management, Fixed Asset
Rice University
Skills you'll gain: Diversity Equity and Inclusion Initiatives, Diversity Training, Diversity and Inclusion, Diversity Awareness, Intercultural Competence, Human Resource Strategy, Employee Retention, Demography, Benchmarking, Social Justice, Human Resources, Recruitment Strategies, Peer Review, Organizational Development, Workforce Development, Cultural Diversity, Organizational Effectiveness, Program Evaluation, Organizational Change, Human Resource Policies
In summary, here are 10 of our most popular cyber security policies courses
- Foundations of AI and Machine Learning:Â Microsoft
- Vulnerability Scanning with Nmap: Network Scanning:Â Coursera Project Network
- Requirements Gathering for Secure Software Development:Â University of Colorado System
- DDHH y democracia: una visión desde América Latina: Universidad de los Andes
- Secure Access with Azure Active Directory:Â Microsoft
- Web Connectivity and Security in Embedded Systems:Â EIT Digital
- Data Analytics in the Public Sector with R:Â University of Michigan
- Fundamentals of Data Governance:Â Edureka
- Gemini for Google Cloud Learning Path:Â Google Cloud
- Identifying and Managing Security Gaps for Remote Teams:Â LearnQuest