Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security policies"
New York Institute of Finance
Skills you'll gain: Risk Management, Business Risk Management, Risk Modeling, Risk Appetite, Risk Management Framework, Operational Risk, Enterprise Risk Management (ERM), Credit Risk, Risk Analysis, Portfolio Management, Capital Markets, Financial Market, Investment Management, Regulatory Requirements, Financial Regulation, Financial Modeling, Market Liquidity, Probability Distribution
University of Virginia
Skills you'll gain: Technology Strategies, Information Technology, Business Analysis, Business Strategy, Cyber Risk, Design Thinking, Cybersecurity, Business Modeling, Agile Methodology, Artificial Intelligence, Project Portfolio Management, Product Lifecycle Management, Technical Communication, Value Propositions
University of Illinois Urbana-Champaign
Skills you'll gain: Cloud Infrastructure, Cloud Services, Cloud Computing, Cloud Storage, Cloud Platforms, Infrastructure As A Service (IaaS), Containerization, Data Storage Technologies, Virtualization, Virtual Machines, Cloud Applications, Amazon S3, Platform As A Service (PaaS), File Systems
Imperial College London
Skills you'll gain: Preventative Care, Epidemiology, Health Systems, Health Assessment, Policy Analysis, Social Justice, Social Sciences, Public Policies, Economics, Policy, and Social Studies, Socioeconomics, Program Evaluation, Ethical Standards And Conduct, Advocacy, Governance, Diversity Equity and Inclusion Initiatives
Google Cloud
Skills you'll gain: SQL, Big Data, Google Cloud Platform, Database Architecture and Administration, Performance Tuning, Jupyter, Data Warehousing, Data Security, Data Science, Data Structures, Data Analysis
- Status: Free
Universidad Nacional Autónoma de México
Skills you'll gain: International Relations, Public Policies, Policty Analysis, Research, and Development, Policy Development, Public Affairs, Diplomacy, Economic Development, Community Development, Advocacy, Governance, Law, Regulation, and Compliance
- Status: Free
Tel Aviv University
Skills you'll gain: Social Sciences, International Relations, Political Sciences, Diplomacy, Public Safety and National Security, Socioeconomics, Demography, Cultural Diversity
Skills you'll gain: Incident Management, Incident Response, Security Management, Computer Security Incident Management, Continuous Monitoring, Infrastructure Security, Cybersecurity, Cyber Security Policies, Remote Access Systems, Telecommuting, Cyber Security Assessment, Security Strategy, Employee Engagement, Technology Roadmaps
Skills you'll gain: Oracle Cloud, Identity and Access Management, Oracle Databases, Cloud Infrastructure, Database Software, Cloud Computing Architecture, Cloud Security, Cloud Computing, Infrastructure As A Service (IaaS), Cloud Storage, Data Storage Technologies, Authentications, Authorization (Computing), Scalability
Google
Skills you'll gain: TCP/IP, Systems Administration, Network Troubleshooting, IT Infrastructure, File Systems, OSI Models, Cybersecurity, Cyber Attacks, Network Security, Network Protocols, Microsoft Windows, Application Security, Operating Systems, Lightweight Directory Access Protocols, Linux, Server Administration, Technical Support, Computer Hardware, Help Desk Support, Computer Networking
Skills you'll gain: Data Governance, Descriptive Analytics, Data Storytelling, Supply Chain, Data Presentation, Supply Chain Management, Demand Planning, Presentations, Data Visualization, Supply Chain Systems, Supply Chain Planning, Transportation, Supply Chain, and Logistics, Process Improvement, Data Management, Data Lakes, Predictive Analytics, Forecasting, Data Analysis, Data Analysis Software, Real Time Data
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Patch Management, Amazon CloudWatch, Infrastructure Security, Threat Detection, Amazon S3, Vulnerability Scanning, Data Security, Cloud Security, Network Security, Incident Response, Data Governance, Authorization (Computing), Continuous Monitoring, Cyber Governance, Firewall, Vulnerability Assessments, Role-Based Access Control (RBAC)
In summary, here are 10 of our most popular cyber security policies courses
- Introduction to Risk Management: New York Institute of Finance
- Customer-Centric IT Strategy: University of Virginia
- Cloud Computing Applications, Part 1: Cloud Systems and Infrastructure: University of Illinois Urbana-Champaign
- Foundations of Public Health Practice: The Public Health Approach: Imperial College London
- Achieving Advanced Insights with BigQuery: Google Cloud
- Los gobiernos locales como actores internacionales: Universidad Nacional Autónoma de México
- The History of Modern Israel - Part I: From an Idea to a State: Tel Aviv University
- Incident Management and Continuous Improvement: LearnQuest
- Oracle Cloud Infrastructure Foundations: Oracle
- IT-підтримка від Google: Google