Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security policies"
Institut Mines-Télécom
Skills you'll gain: Wireless Networks, Network Architecture, Network Security, Network Infrastructure, Service Oriented Architecture, Network Performance Management, Computer Networking, Emerging Technologies, Network Protocols, Mobile Security, Digital Communications, Authentications, Encryption
Microsoft
Skills you'll gain: Cascading Style Sheets (CSS), GitHub, Database Management, C# (Programming Language), Microsoft SQL Servers, HTML and CSS, ASP.NET, Load Balancing, Role-Based Access Control (RBAC), Scalability, Object Oriented Programming (OOP), Authentications, Full-Stack Web Development, .NET Framework, Programming Principles, Application Programming Interface (API), Graph Theory, User Interface (UI), User Interface and User Experience (UI/UX) Design, Data Structures
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Information Systems Security, Cybersecurity, Computer Security, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Algorithms
Rice University
Skills you'll gain: Economics, Supply And Demand, Business Economics, Market Dynamics, Economic Development, Game Theory, Financial Policy, Socioeconomics, Tax, Market Analysis, International Relations, Operating Cost, Public Policies, Cost Benefit Analysis, Business Metrics, Performance Metric, Fiscal Management, Consumer Behaviour, Investments, Labor Relations
University of California, Irvine
Skills you'll gain: Swift Programming, Objective-C (Programming Language), iOS Development, Core Data (Software), Apple iOS, Apple Xcode, Model View Controller, JSON, User Interface (UI) Design, UI Components, User Interface and User Experience (UI/UX) Design, OAuth, Responsive Web Design, Prototyping, Human Computer Interaction, UI/UX Strategy, Usability Testing, Authentications, Data Mapping, Mobile Development
FAIR Institute
Skills you'll gain: Incident Response, Cyber Risk, Cyber Governance, Cyber Security Strategy, Computer Security Incident Management, Enterprise Risk Management (ERM), Business Risk Management, Operational Risk, Mergers & Acquisitions, Cybersecurity, Cyber Security Assessment, Risk Analysis, Security Management, Risk Management, Safety Culture, Financial Regulations, Compliance Management, Regulatory Requirements
Johns Hopkins University
Skills you'll gain: Personally Identifiable Information, Encryption, Health Information Management and Medical Records, Healthcare Industry Knowledge, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Information Privacy, Regulatory Compliance, Cloud Computing, Cyber Security Policies, Patient Safety, End User Training and Support
Skills you'll gain: Cyber Risk, Risk Management, Enterprise Risk Management (ERM), Risk Analysis, Risk Modeling, Security Management, Operational Risk, Cybersecurity, Business Risk Management, Compliance Management, Stakeholder Communications, Continuous Improvement Process, Compliance Reporting, Decision Making, Financial Analysis
Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Email Security, Threat Detection, Jupyter, Authentications, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Threat Management, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning
Coursera Project Network
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Web Scraping, Web Applications
- Status: Free
École des Ponts ParisTech
Skills you'll gain: Socioeconomics, Market Dynamics, Social Studies, Economic Development, Transportation Operations, Market Analysis, Public Policies, Environmental Policy, Environment, Economics, Market Opportunities, Automation, Market Trend, Cost Benefit Analysis, Technology Roadmaps, Feasibility Studies, Consumer Behaviour
Google Cloud
Skills you'll gain: Google Workspace, Gmail, Scripting, User Accounts, Automation, System Configuration, Document Management, File Management, Configuration Management, Application Development
In summary, here are 10 of our most popular cyber security policies courses
- 5G Network Fundamentals: Institut Mines-Télécom
- Microsoft Full-Stack Developer:Â Microsoft
- Applied Cryptography:Â University of Colorado System
- A Story of Economics: A Principles Tale:Â Rice University
- iOS Development for Creative Entrepreneurs:Â University of California, Irvine
- Understanding Cyber Risk Reporting with FAIRâ„¢:Â FAIR Institute
- Healthcare Data Security, Privacy, and Compliance:Â Johns Hopkins University
- Practical Applications of FAIRâ„¢ for Cyber Risk Management:Â FAIR Institute
- Introduction to AI for Cybersecurity:Â Johns Hopkins University
- Web Application Security Testing with OWASP ZAP:Â Coursera Project Network