Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security policies"
University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Application Security, Cryptography, Data Storage
University at Buffalo
Skills you'll gain: Blockchain, Program Development, Secure Coding, Software Development, Development Environment, Web Development Tools, Software Design, Solution Design, Data Validation
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Information Systems Security, Cybersecurity, Computer Security, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Algorithms
Skills you'll gain: Application Deployment, Cloud Infrastructure, CI/CD, Cloud Security, Service Level Agreement, Microservices, Service Level, Google Cloud Platform, Network Architecture, API Design, Site Reliability Engineering, Cloud Computing Architecture, Kubernetes, Restful API, Infrastructure Architecture, Cloud Storage, Cloud Applications, Key Performance Indicators (KPIs), DevOps, Data Storage
- Status: Free
University of London
Skills you'll gain: Environmental Policy, International Relations, Environment, Governance, Policy Development, Policy Analysis, Economics, Security Strategy, Mitigation, Stakeholder Engagement
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Continuous Monitoring, Business Continuity, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Application Security, Incident Management, Security Engineering, Data Security, Network Security, User Provisioning, OSI Models, Data Loss Prevention
- Status: [object Object]
Google Cloud
Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Generative AI, DevSecOps, Cloud Computing, Data Security, Google Cloud Platform, Cybersecurity
- Status: Free
University of London
Skills you'll gain: International Relations, Diplomacy, Social Sciences, Public Policies, Social Justice, Systems Thinking, Policy Analysis, Governance, Cultural Diversity
Skills you'll gain: OAuth, API Design, Restful API, API Gateway, Application Programming Interface (API), Cloud API, Continuous Deployment, Application Deployment, Authentications, Google Cloud Platform, Application Lifecycle Management, Security Controls, Proxy Servers, Authorization (Computing), Continuous Integration, Cloud Applications, Application Security, Software Design Documents, Software Documentation, Information Systems Security
- Status: [object Object]
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, Operating Systems, Network Protocols, TCP/IP, Application Security, Microsoft Teams, Productivity Software, Information Systems Security, Multi-Factor Authentication
University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Network Security, Digital Communications, Authentications, Data Integrity, Algorithms
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
In summary, here are 10 of our most popular security policies courses
- Networking and Security in iOS Applications:Â University of California, Irvine
- Smart Contracts:Â University at Buffalo
- Applied Cryptography:Â University of Colorado System
- Reliable Google Cloud Infrastructure: Design and Process:Â Google Cloud
- Global Energy and Climate Policy:Â University of London
- CISSP Certified Information Systems Security Professional:Â Packt
- Google Cloud Cybersecurity:Â Google Cloud
- Global Diplomacy: the United Nations in the World:Â University of London
- Developing APIs with Google Cloud's Apigee API Platform:Â Google Cloud
- Microsoft IT Support Specialist:Â Microsoft