Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security policies"
- Status: Free
University of Pittsburgh
Skills you'll gain: Triage, Mitigation, Business Continuity Planning, Emergency Response, Safety and Security, Public Safety and National Security, Resilience, Emergency Medicine, First Aid, Risk Management, Cultural Diversity
University of Pennsylvania
Skills you'll gain: Compliance Management, Law, Regulation, and Compliance, Business Ethics, Internal Controls, Risk Analysis, Financial Controls, Auditing, Risk Management, Due Diligence, Employee Training, Policy Development, International Relations
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Economic Development, Policy Development, Policy Analysis, International Relations, Research, Economics, Technical Communication, Diplomacy, Business Economics, Econometrics, Analysis, Market Dynamics
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Software Design, Programming Principles, Debugging, Program Development, C (Programming Language), Software Development Methodologies
Illinois Tech
Skills you'll gain: Firewall, Microsoft Windows, System Support, Operating Systems, Event Monitoring, Linux, Linux Administration, System Configuration, Network Security, Authorization (Computing), System Monitoring, System Software, Hardening, Computer Security, Systems Administration, File Management, Data Security, Security Information and Event Management (SIEM), Identity and Access Management
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Patch Management, Amazon CloudWatch, Infrastructure Security, Threat Detection, Amazon S3, Vulnerability Scanning, Data Security, Cloud Security, Network Security, Incident Response, Data Governance, Authorization (Computing), Continuous Monitoring, Cyber Governance, Firewall, Vulnerability Assessments, Role-Based Access Control (RBAC)
University at Buffalo
Skills you'll gain: Digital Transformation, Manufacturing Processes, Manufacturing Operations, Industrial Engineering, Business Transformation, Product Design, Digital Design, Data-Driven Decision-Making, Process Improvement and Optimization, Market Dynamics, Safety and Security, Workforce Development
Skills you'll gain: Computer Security Incident Management, Incident Management, Incident Response, Security Management, Threat Management, Event Monitoring, Security Information and Event Management (SIEM), Enterprise Security, Cyber Operations, Information Technology Operations, Automation
Skills you'll gain: Blockchain, Digital Assets, FinTech, Plan Execution, Business Strategies, Business Strategy, Strategic Decision-Making, Payment Systems, Governance, Feasibility Studies, Financial Services, Financial Regulation, Work Breakdown Structure, Project Implementation, Market Opportunities, Financial Systems, Cryptography, Design, Emerging Technologies, Stakeholder Management
Johns Hopkins University
Skills you'll gain: Public Safety and National Security, Public Policies, Policy Analysis, Policy Development, Community Development, Social Studies, Law, Regulation, and Compliance, Advocacy, Research
Skills you'll gain: Kubernetes, Cloud-Native Computing, Google Cloud Platform, Application Deployment, Scalability, Load Balancing, Cloud Infrastructure, Containerization, Cloud Computing, YAML, Data Storage, Authorization (Computing), General Networking, Network Security
Multiple educators
Skills you'll gain: Apache Airflow, Data Modeling, Data Pipelines, Data Storage, Data Architecture, Data Transformation, Requirements Analysis, Data Processing, Data Warehousing, Query Languages, Apache Hadoop, Extract, Transform, Load, Data Lakes, Amazon Web Services, File Systems, Data Infrastructure, Database Systems, Data Integration, AWS Kinesis, Infrastructure as Code (IaC)
In summary, here are 10 of our most popular cyber security policies courses
- Disaster Preparedness:Â University of Pittsburgh
- What is Corruption: Anti-Corruption and Compliance:Â University of Pennsylvania
- Trade & investment: evidence-based policies for development:Â Erasmus University Rotterdam
- Principles of Secure Coding:Â University of California, Davis
- OS Security:Â Illinois Tech
- Exam Prep SCS-C02: AWS Certified Security – Specialty: Whizlabs
- Digital Manufacturing & Design:Â University at Buffalo
- SOAR for Enterprise Security:Â Codio
- Blockchain Revolution in Financial Services:Â INSEAD
- Reducing Gun Violence in America: Evidence for Change:Â Johns Hopkins University