Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "governance and security"
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
University of California, Irvine
Skills you'll gain: Grammar
Michigan State University
Skills you'll gain: Design Elements And Principles, Peer Review, Graphic and Visual Design, Post-Production, Project Planning, Color Theory, Digital Design, Constructive Feedback, File Management, Adobe Creative Cloud, Creativity, Creative Design, Project Management, Storytelling, Content Creation, Aesthetics, Electronic Media, Editing, Liberal Arts, Writing
Johns Hopkins University
Skills you'll gain: Rmarkdown, Version Control, Data Science, General Science and Research, Data Analysis, R Programming, Statistical Programming, Exploratory Data Analysis, Software Installation
Skills you'll gain: Project Management, Milestones (Project Management), Data Storytelling, Requirements Analysis, Project Scoping, Stakeholder Management, Project Planning, Project Documentation, Quality Management, Interviewing Skills, Communication
University of California, Irvine
Skills you'll gain: Stakeholder Management, Conflict Management, Project Management, Project Planning, Project Management Life Cycle, Project Documentation, Requirements Management, Project Scoping, Organizational Structure, Planning, Influencing
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
University of Pennsylvania
Skills you'll gain: Generative AI, Data Ethics, HR Tech, Data Governance, Big Data, Machine Learning, Data Security, Governance, Business Strategy, Human Resources, Organizational Strategy, Credit Risk, Business Transformation, Risk Management, Tensorflow, Personalized Service, Digital Transformation, Data-Driven Decision-Making, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence
Kennesaw State University
Skills you'll gain: Internet Of Things, Cybersecurity, Cyber Security Strategy, Mobile Security, Security Awareness, Wireless Networks, Information Privacy, Network Security, Data Security, Emerging Technologies, Risk Management Framework
Skills you'll gain: HTML and CSS, Bootstrap (Front-End Framework), Responsive Web Design, Front-End Web Development, User Interface (UI), Hypertext Markup Language (HTML), Web Design and Development, Web Development, Web Applications, Cascading Style Sheets (CSS), React.js, Javascript
Rice University
Skills you'll gain: Statistical Hypothesis Testing, Microsoft Excel, Pivot Tables And Charts, Regression Analysis, Descriptive Statistics, Probability & Statistics, Graphing, Spreadsheet Software, Probability Distribution, Business Analytics, Statistical Analysis, Statistical Modeling, Excel Formulas, Data Analysis, Data Presentation, Statistics, Sample Size Determination, Box Plots, Statistical Inference, Estimation
Johns Hopkins University
Skills you'll gain: Triage, Crisis Intervention, Rapport Building, Emergency Response, Trauma Care, First Aid, Interpersonal Communications, Community Mental Health Services, Mental Health, Stress Management, Patient Referral, Health Assessment
Searches related to governance and security
In summary, here are 10 of our most popular governance and security courses
- Network Security: ISC2
- Grammar and Punctuation: University of California, Irvine
- Photography Basics and Beyond: From Smartphone to DSLR: Michigan State University
- The Data Scientist’s Toolbox: Johns Hopkins University
- Capstone: Applying Project Management in the Real World: Google
- Initiating and Planning Projects: University of California, Irvine
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- AI For Business: University of Pennsylvania
- Cybersecurity and the Internet of Things: Kennesaw State University
- Introduction to Front-End Development: Meta