Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security policies"
Skills you'll gain: API Design, Restful API, API Gateway, Application Programming Interface (API), Cloud API, Application Lifecycle Management, Proxy Servers, Cloud Applications, Software Design Documents, Software Documentation, Google Cloud Platform, Authentications
Skills you'll gain: Endpoint Security, Infrastructure Security, Security Management, Network Security, Security Controls, Data Security, Security Strategy, Application Security, Cybersecurity, IT Infrastructure, Information Management, Enterprise Security, Data Integrity
University of Alberta
Skills you'll gain: Reinforcement Learning, Sampling (Statistics), Machine Learning Algorithms, Simulations, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning, Statistical Methods, Probability Distribution
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security), Personally Identifiable Information
Google Cloud
Skills you'll gain: Cloud Infrastructure, Cloud Development, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Applications, Identity and Access Management, Infrastructure As A Service (IaaS), Google Cloud Platform, Kubernetes, Cloud Security, Cloud Services, Cloud Storage, Application Development, Containerization, Encryption, Virtual Machines, OAuth, Security Controls, Cloud Computing, Data Loss Prevention, Continuous Monitoring
University of Pennsylvania
Skills you'll gain: Blockchain, Cryptography, Digital Assets, Investments, Portfolio Management, Investment Management, FinTech, Asset Management, Financial Analysis, Financial Market, Emerging Technologies, Public Key Infrastructure, Finance, Payment Systems, Encryption, Return On Investment, Data Security, Data Integrity, Risk Analysis
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Compliance Auditing, Communication Planning, Internal Communications, Procedure Development, Continuous Monitoring, Governance Risk Management and Compliance, Culture Transformation, Industrial and Organizational Psychology, Ethical Standards And Conduct, Psychology
- Status: Free
University of London
Skills you'll gain: International Relations, Diplomacy, Social Sciences, Public Policies, Social Justice, Systems Thinking, Policy Analysis, Governance, Cultural Diversity
Skills you'll gain: NIST 800-53, Risk Management Framework, Cyber Risk, Federal Information Security Management Act, Cybersecurity, Risk Management, Security Management, Cyber Governance, Cyber Security Strategy, Operational Risk, Governance Risk Management and Compliance, Security Controls, Continuous Monitoring, Infrastructure Security, Cyber Security Assessment, Enterprise Risk Management (ERM), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
Kennesaw State University
Skills you'll gain: Cyber Governance, Risk Management Framework, Risk Analysis, Risk Management, Threat Detection, Threat Management, Business Risk Management, Cyber Risk, Security Management, Governance, Cybersecurity, Cyber Security Strategy, Security Strategy, Asset Management
University of Michigan
Skills you'll gain: Data Ethics, Information Privacy, Personally Identifiable Information, Data Security, Data Governance, Ethical Standards And Conduct, Big Data, Law, Regulation, and Compliance, Data Analysis, Social Sciences, Data-Driven Decision-Making, Diversity Awareness
In summary, here are 10 of our most popular security policies courses
- API Design and Fundamentals of Google Cloud's Apigee API Platform:Â Google Cloud
- Security Infrastructure Management:Â Codio
- Sample-based Learning Methods:Â University of Alberta
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Security in Google Cloud en Français: Google Cloud
- Cryptocurrency and Blockchain: An Introduction to Digital Currencies:Â University of Pennsylvania
- Effective Compliance Programs:Â University of Pennsylvania
- Global Diplomacy: the United Nations in the World:Â University of London
- Cybersecurity Risk Management Framework:Â Infosec
- Secure Coding Practices:Â University of California, Davis