Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "manage security policies"
University of Colorado System
Skills you'll gain: Requirements Elicitation, Software Design Documents, Requirements Analysis, Security Requirements Analysis, Mockups, Interviewing Skills, User Requirements Documents, Storyboarding, Functional Requirement, Goal Setting, Software Documentation, Agile Methodology, Business Requirements, Unified Modeling Language, Risk Management Framework, System Requirements, Meeting Facilitation, Prototyping, Software Development Life Cycle, Technical Documentation
University of Pennsylvania
Skills you'll gain: Resilience, Positivity, Optimism, Overcoming Obstacles, Relationship Building, Learning Strategies, Composure, Self-Awareness, Adaptability, Stress Management, Problem Solving, Dealing With Ambiguity
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Data Integrity, Security Testing, Cybersecurity, Patch Management, Authorization (Computing), Network Security, Cryptography, Extensible Markup Language (XML), System Configuration, Scripting, Encryption, Software Design
Johns Hopkins University
Skills you'll gain: Data Science, Data Analysis, Business Analytics, Data-Driven Decision-Making, Project Design, Performance Metric, Software Engineering, Project Performance, Machine Learning, Statistical Inference
Skills you'll gain: Azure Active Directory, Active Directory, Microsoft Azure, Security Controls, Identity and Access Management, Security Information and Event Management (SIEM), Generative AI, Cloud Security, Data Governance, Authentications, Network Security, Role-Based Access Control (RBAC), Data Security, Cybersecurity, System Monitoring, Threat Detection, Multi-Factor Authentication, Encryption
LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Penetration Testing, Network Security, Malware Protection, Cybersecurity, Cloud Computing, Mobile Security, Application Security, Cyber Attacks, Cyber Security Assessment, Security Testing, Threat Detection, Information Systems Security, Cyber Threat Intelligence, Intrusion Detection and Prevention, Virtualization, Firewall, Vulnerability Assessments, Threat Modeling
Google Cloud
Skills you'll gain: Google Sheets, Spreadsheet Software, Pivot Tables And Charts, Data Sharing, Data Presentation, Data Visualization Software, Data Analysis, Big Data, Data Manipulation, Data Management
Rice University
Skills you'll gain: Communication Planning, Stakeholder Management, Organizational Structure, Project Documentation, Project Management, Project Management Life Cycle, Project Scoping, Project Planning, Requirements Management, Financial Analysis, Business Analysis, Peer Review
Skills you'll gain: Identity and Access Management, Endpoint Security, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cyber Security Strategy, Secure Coding, Firewall, Application Security, Authentications, Security Controls, Authorization (Computing), Security Information and Event Management (SIEM), Data Governance, Incident Response
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Information Systems Security, Cybersecurity, Computer Security, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Algorithms
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
Duke University
Skills you'll gain: Loans, Blockchain, FinTech, Lending and Underwriting, Operational Risk, Scalability, Security Testing, Interoperability, Payment Systems, General Lending, Risk Management, Consumer Lending, Derivatives, Key Management, Credit Risk, Cryptography, Emerging Technologies, Financial Regulations, Digital Assets, Financial Systems
In summary, here are 10 of our most popular manage security policies courses
- Requirements Engineering: Secure Software Specifications:Â University of Colorado System
- Positive Psychology: Resilience Skills:Â University of Pennsylvania
- OWASP Top 10 - 2021:Â Infosec
- A Crash Course in Data Science:Â Johns Hopkins University
- Microsoft SC-900 Exam Preparation and Practice:Â Microsoft
- Certified Ethical Hacking (v12):Â LearnKartS
- Doing more with Google Sheets:Â Google Cloud
- Engineering Project Management: Initiating and Planning:Â Rice University
- Cybersecurity Architecture:Â IBM
- Applied Cryptography:Â University of Colorado System