Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security policies"
- Status: Free
Johns Hopkins University
Skills you'll gain: Environmental Monitoring, Environment Health And Safety, Health Assessment, Epidemiology, Health Care Procedure and Regulation, Environmental Policy, Environment, Regulation and Legal Compliance, Medical Science and Research, Policty Analysis, Research, and Development, Public Policies, Risk Analysis
University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Security Management, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, Risk Management Framework
Columbia University
Skills you'll gain: International Finance, Derivatives, Financial Systems, Balance Sheet, Financial Market, Payment Systems, Banking, Capital Markets, Financial Trading, Economics, Market Liquidity, Financial Regulation, Finance, Credit Risk
Google Cloud
Skills you'll gain: User Provisioning, User Accounts, Mobile Security, Security Controls, Identity and Access Management, Cloud Security, Single Sign-On (SSO), System Configuration, Google Workspace, Multi-Factor Authentication
Workday
Skills you'll gain: Workday (Software), Security Controls, Business Process, Workflow Management, Business Reporting, Human Resources Software, System Configuration, Role-Based Access Control (RBAC), Organizational Structure
University of Illinois Urbana-Champaign
Skills you'll gain: Distributed Computing, Cloud Infrastructure, Cloud Services, Big Data, Apache Spark, Cloud Computing, Cloud Storage, Cloud Platforms, Network Architecture, Computer Networking, File Systems, Apache Hadoop, Network Infrastructure, Cloud Applications, Infrastructure As A Service (IaaS), General Networking, Software-Defined Networking, Containerization, NoSQL, Operating Systems
Google Cloud
Skills you'll gain: Single Sign-On (SSO), Lightweight Directory Access Protocols, Google Workspace, Multi-Factor Authentication, Cloud Security, Application Security, Security Management, Identity and Access Management, Authentications, Information Privacy, Application Programming Interface (API)
Johns Hopkins University
Skills you'll gain: Personally Identifiable Information, Encryption, Health Information Management and Medical Records, Healthcare Industry Knowledge, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Information Privacy, Regulatory Compliance, Cloud Computing, Cyber Security Policies, Patient Safety, End User Training and Support
Skills you'll gain: Continuous Monitoring, NIST 800-53, Security Controls, Risk Management Framework, Authorization (Computing), Security Strategy, Security Management, Configuration Management, Cyber Risk, Change Control, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Cyber Security Assessment, Vulnerability Assessments
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Linux Commands, TCP/IP, General Networking, Scripting, MySQL, Data Structures
- Status: Free
Lund University
Skills you'll gain: Environmental Resource Management, Environment and Resource Management, Materials Management, Waste Minimization, Systems Thinking, Environmental Management Systems, Supply Chain Management, Environmental Policy, Business Strategies, Industrial Design, Innovation, Stakeholder Engagement, Policy Analysis, Value Propositions
Skills you'll gain: Personally Identifiable Information, Information Privacy, Security Awareness, Data Security, Cybersecurity, Health Information Management and Medical Records, Information Assurance, Security Controls, Data Sharing, Security Strategy, Health Care, Data Integrity, Data Access, Identity and Access Management, Regulatory Compliance
In summary, here are 10 of our most popular security policies courses
- Chemicals and Health: Johns Hopkins University
- Homeland Security & Cybersecurity Connection - It's Not About the Terrorists: University of Colorado System
- Economics of Money and Banking: Columbia University
- Introduction to Cloud Identity: Google Cloud
- Workday Basics Series: Workday
- Cloud Computing: University of Illinois Urbana-Champaign
- Google Workspace Security 日本語版: Google Cloud
- Healthcare Data Security, Privacy, and Compliance: Johns Hopkins University
- Advanced Risk Management, Security Controls & Monitoring: Packt
- Akamai Network Engineering: Akamai Technologies, Inc.