Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "manage security policies"
Skills you'll gain: Incident Response, Business Continuity, Disaster Recovery, Cybersecurity, Security Management, Computer Security Incident Management, Crisis Management, Information Assurance
University of Michigan
Skills you'll gain: Team Building, Teamwork, Team Management, Team Leadership, Conflict Management, Team Motivation, Collaboration, Relationship Building, Performance Management, Organizational Structure, Innovation, People Development, Industrial and Organizational Psychology, Diversity and Inclusion, Goal Setting, Decision Making
Skills you'll gain: Multimedia, Microsoft PowerPoint, Presentations, Microsoft 365, Productivity Software, Microsoft Windows, Editing, Product Demonstration, File Management
University of Alberta
Skills you'll gain: Reinforcement Learning, Sampling (Statistics), Machine Learning Algorithms, Simulations, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning, Statistical Methods, Probability Distribution
Skills you'll gain: Istio, Kubernetes, Containerization, OpenShift, Cloud-Native Computing, Docker (Software), DevOps, Application Deployment, Cloud Applications, Microservices, Virtualization, Command-Line Interface, Scalability
University of Michigan
Skills you'll gain: Payment Systems, Payment Processing, Mobile Banking, FinTech, Credit/Debit Card Processing, Point of Sale, Mobile Security, Financial Systems, Banking, Emerging Technologies, Digital Assets
Macquarie University
Skills you'll gain: Stress Management, Resilience, Personal Development, Time Management, Intercultural Competence, Cultural Diversity, Professional Development, Cultural Sensitivity, Adaptability, Self-Awareness, Business Ethics, Business Writing, Leadership Development, Diversity and Inclusion, Cross-Functional Team Leadership, Leadership Studies, Prioritization, Lifelong Learning, Mental Health, Communication
University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Network Security, Digital Communications, Authentications, Data Integrity, Algorithms
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security), Personally Identifiable Information
Google Cloud
Skills you'll gain: User Provisioning, User Accounts, Mobile Security, Security Controls, Identity and Access Management, Cloud Security, Single Sign-On (SSO), System Configuration, Google Workspace, Multi-Factor Authentication
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Compliance Auditing, Communication Planning, Internal Communications, Procedure Development, Continuous Monitoring, Governance Risk Management and Compliance, Culture Transformation, Industrial and Organizational Psychology, Ethical Standards And Conduct, Psychology
Rutgers the State University of New Jersey
Skills you'll gain: Strategic Sourcing, Supplier Relationship Management, Procurement, Supplier Management, Purchasing, Supply Management, Vendor Relationship Management, Supply Chain, Supplier Performance Management, Vendor Management, Strategic Decision-Making, Competitive Analysis, Decision Making, Business Risk Management, Cost Benefit Analysis
In summary, here are 10 of our most popular manage security policies courses
- Incident Response, BC, and DR Concepts:Â ISC2
- Leading Teams:Â University of Michigan
- Work Smarter with Microsoft PowerPoint:Â Microsoft
- Sample-based Learning Methods:Â University of Alberta
- Introduction to Containers w/ Docker, Kubernetes & OpenShift:Â IBM
- The Future of Payment Technologies:Â University of Michigan
- Adapting: Career Development:Â Macquarie University
- Cryptography:Â University of Maryland, College Park
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Introduction to Cloud Identity:Â Google Cloud