Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security policies"
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Information Privacy, Personally Identifiable Information, Regulatory Compliance, Compliance Management, Compliance Training, Data Security, Health Care Procedure and Regulation, Data Governance, Incident Response
University of Alberta
Skills you'll gain: Sprint Planning, Project Risk Management, User Story, Backlogs, Agile Methodology, User Requirements Documents, Functional Requirement, Agile Project Management, Requirements Analysis
EDHEC Business School
Skills you'll gain: Environmental Policy, Economics, Environmental Issue, Cost Benefit Analysis, Policy Analysis, Derivatives, Financial Market, Tax, Financial Trading, Mathematical Modeling, Mitigation
EIT Digital
Skills you'll gain: Embedded Systems, Embedded Software, Internet Of Things, Operating Systems, Wireless Networks, System Programming, Computer Systems, Simulations, C (Programming Language), Network Protocols, Event-Driven Programming, Application Programming Interface (API), Peripheral Devices
- Status: Free
UNSW Sydney (The University of New South Wales)
Skills you'll gain: Systems Engineering, Engineering Management, Conceptual Design, Systems Design, Requirements Analysis, Systems Development Life Cycle, Requirements Elicitation, Systems Architecture, Systems Integration, System Design and Implementation, Technical Design, Configuration Management, Prototyping, Verification And Validation
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Human Factors (Security), Threat Management, Security Awareness, Cybersecurity, Cyber Risk, Cyber Attacks, Security Strategy, Compliance Training, Employee Training
Lund University
Skills you'll gain: Law, Regulation, and Compliance, International Relations, Regulatory Compliance, Business Economics, Compliance Management, Business Administration, E-Commerce, Public Policies, Labor Law, Organizational Structure, Financial Regulation, Economics, Tax Laws, Contract Review, Higher Education, Governance, Decision Making
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
Skills you'll gain: API Design, Restful API, API Gateway, Application Programming Interface (API), Cloud API, Application Lifecycle Management, Proxy Servers, Cloud Applications, Software Design Documents, Software Documentation, Google Cloud Platform, Authentications
Qualcomm Academy
Skills you'll gain: Wireless Networks, Emerging Technologies, Internet Of Things, General Networking, Digital Communications, Data Security, Technology Strategies, Network Planning And Design, Network Infrastructure, Virtualization
Skills you'll gain: Cost Management, Quality Management, Backlogs, Project Closure, Project Planning, Sprint Retrospectives, Project Scoping, Team Leadership, Project Management Life Cycle, Agile Project Management, Communication Planning, Continuous Improvement Process, Process Improvement, Project Management Software, Project Management, Change Control, Project Controls, Agile Methodology, Requirements Analysis, Change Management
Ludwig-Maximilians-Universität München (LMU)
Skills you'll gain: Mergers & Acquisitions, Customer Retention, Business Strategy, Growth Strategies, Compliance Management, Competitive Analysis, Strategic Partnership, Product Strategy, New Business Development, Market Dynamics, Market Analysis
In summary, here are 10 of our most popular cyber security policies courses
- Privacy Law and Data Protection:Â University of Pennsylvania
- Agile Planning for Software Products:Â University of Alberta
- Economics and Policies of Climate Change:Â EDHEC Business School
- Embedded Hardware and Operating Systems:Â EIT Digital
- Introduction to Systems Engineering:Â UNSW Sydney (The University of New South Wales)
- Cybersecurity and the X-Factor:Â Kennesaw State University
- European Business Law: Understanding the Fundamentals:Â Lund University
- Identifying Security Vulnerabilities in C/C++Programming:Â University of California, Davis
- API Design and Fundamentals of Google Cloud's Apigee API Platform:Â Google Cloud
- 5G for Everyone:Â Qualcomm Academy