Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security policies"
Skills you'll gain: API Design, Restful API, API Gateway, Application Programming Interface (API), Cloud API, Application Lifecycle Management, Proxy Servers, Cloud Applications, Software Design Documents, Software Documentation, Google Cloud Platform, Authentications
Lund University
Skills you'll gain: Law, Regulation, and Compliance, International Relations, Regulatory Compliance, Business Economics, Compliance Management, Business Administration, E-Commerce, Public Policies, Labor Law, Organizational Structure, Financial Regulation, Economics, Tax Laws, Contract Review, Higher Education, Governance, Decision Making
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Information Privacy, Personally Identifiable Information, Regulatory Compliance, Compliance Management, Compliance Training, Data Security, Health Care Procedure and Regulation, Data Governance, Incident Response
Skills you'll gain: Azure Active Directory, Authentications, Identity and Access Management, Authorization (Computing), Active Directory, Role-Based Access Control (RBAC), Multi-Factor Authentication, Single Sign-On (SSO), Software As A Service, User Accounts
Amazon Web Services
Skills you'll gain: Descriptive Analytics, Analytics, Data Analysis, Dashboard, AWS Identity and Access Management (IAM), Data Visualization, Amazon Web Services, Exploratory Data Analysis, Amazon S3, Business Intelligence, Cloud Computing, Cloud Security
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Software Testing, Selenium (Software), Gherkin (Scripting Language), JUnit, Verification And Validation, Test Automation, Unit Testing, Security Testing, Regression Testing, Test Case, Software Development Tools, Testability, Behavior-Driven Development, Code Coverage, Performance Testing, Development Testing, Software Engineering Tools, Test Planning, Acceptance Testing
Board Infinity
Skills you'll gain: Vulnerability Assessments, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Cyber Security Assessment, Linux Commands, Cybersecurity, Linux, Network Security, Intrusion Detection and Prevention, Software Installation, Network Analysis
IE Business School
Skills you'll gain: Financial Policy, Public Policies, Economics, Economics, Policy, and Social Studies, Policy Development, Tax, International Finance, Policy Analysis, Financial Regulation, Fiscal Management, Financial Systems, Supply And Demand, Financial Market
Skills you'll gain: OSI Models, Network Security, Security Controls, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Proxy Servers, Distributed Denial-Of-Service (DDoS) Attacks, Network Infrastructure, Network Architecture, Network Monitoring, Authentications, Identity and Access Management
- Status: [object Object]
Microsoft
Skills you'll gain: Microsoft Power Platform, Excel Formulas, Process Flow Diagrams, Business Process Modeling, User Story, Business Requirements, Stakeholder Management, Data Modeling, Microsoft Excel, Microsoft Visio, Software Development Life Cycle, Requirements Analysis, Requirements Elicitation, Quality Management, Pivot Tables And Charts, Power BI, Project Management Life Cycle, Microsoft Power Automate/Flow, Business Analysis, Project Management
- Status: Free
Skills you'll gain: International Relations, Economic Development, Natural Resource Management, Environmental Policy, Economics, Political Sciences, Market Dynamics, Trend Analysis, Socioeconomics, Environment, Supply And Demand, Public Safety and National Security
Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Multi-Factor Authentication, Public Key Infrastructure, Mobile Security, Wireless Networks
In summary, here are 10 of our most popular cyber security policies courses
- API Design and Fundamentals of Google Cloud's Apigee API Platform:Â Google Cloud
- European Business Law: Understanding the Fundamentals:Â Lund University
- Privacy Law and Data Protection:Â University of Pennsylvania
- Cybersecurity Identity and Access Solutions using Azure AD:Â Microsoft
- Getting Started with Data Analytics on AWS:Â Amazon Web Services
- Software Testing and Automation:Â University of Minnesota
- Kali Linux:Â Board Infinity
- Understanding economic policymaking:Â IE Business School
- Network and Communications Security :Â ISC2
- Microsoft Business Analyst:Â Microsoft