Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security policies and frameworks"
- Status: Free
Universiteit Leiden
Skills you'll gain: Public Safety and National Security, Research, Research Methodologies, Policy Analysis, Media and Communications, Social Studies, International Relations, Political Sciences, Trend Analysis, Investigation, Psychology
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Google Sheets, Business Analytics, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Strategy, Data Visualization Software, SQL
- Status: [object Object]
Google
Skills you'll gain: Data Storytelling, Rmarkdown, Data Visualization, Data Presentation, Data Ethics, Interactive Data Visualization, Interviewing Skills, Data Cleansing, Data Validation, Ggplot2, Tableau Software, Presentations, Spreadsheet Software, Data Analysis, Data Visualization Software, Stakeholder Communications, Dashboard, Sampling (Statistics), Analytics, Stakeholder Management
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, NIST 800-53, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, ISO/IEC 27001, Risk Management Framework, Information Assurance, Security Controls, Incident Response
Skills you'll gain: Computer Hardware, Technical Support, Software Installation, Help Desk Support, Information Technology, Hardware Troubleshooting, Microsoft Windows, Linux, Computer Networking, Computational Logic, Technical Documentation
DeepLearning.AI
Skills you'll gain: Tensorflow, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Performance Tuning, Machine Learning Methods, Artificial Neural Networks, Applied Machine Learning, Machine Learning, Supervised Learning, Machine Learning Algorithms, Network Architecture, Algorithms, Analysis, Debugging
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Threat Modeling, Personally Identifiable Information, Malware Protection, Email Security, Incident Response
Skills you'll gain: React Native, Software Development Life Cycle, iOS Development, Flutter (Software), Swift Programming, Apple Xcode, Mobile Development, Android Studio, User Centered Design, Android Development, Apple iOS, React Redux, Git (Version Control System), GitHub, Mobile Development Tools, React.js, Android (Operating System), HTML and CSS, Front-End Web Development, Generative AI
University of Michigan
Skills you'll gain: Web Scraping, Data Processing, Relational Databases, JSON, Database Design, SQL, Network Protocols, Databases, Web Services, Restful API, Programming Principles, Data Cleansing, Data Structures, Data Storytelling, Data Collection, Computer Programming, Python Programming, Data Manipulation, Development Environment, Computational Thinking
In summary, here are 10 of our most popular security policies and frameworks courses
- Terrorism and Counterterrorism: Comparing Theory and Practice: Universiteit Leiden
- Foundations: Data, Data, Everywhere: Google
- Google Data Analytics: Google
- International Cyber Conflicts: The State University of New York
- Assets, Threats, and Vulnerabilities: Google
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Cyber Security Fundamentals: University of London
- Technical Support Fundamentals: Google
- Improving Deep Neural Networks: Hyperparameter Tuning, Regularization and Optimization: DeepLearning.AI
- Introduction to Cybersecurity Fundamentals: Coursera Instructor Network