Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security policies"
University of Minnesota
Skills you'll gain: Software Design Patterns, Software Engineering, Application Security, Object Oriented Design, Software Architecture, Software Quality (SQA/SQC), Threat Modeling, Maintainability, Code Review, Quality Assurance, Continuous Integration, CI/CD, Software Technical Review, Test Driven Development (TDD), Software Development Tools, Software Documentation, Version Control
Skills you'll gain: Kubernetes, CI/CD, Google Cloud Platform, Continuous Integration, DevOps, Continuous Delivery, Cloud Applications, Application Performance Management, Cloud Storage, Cloud Security, Role-Based Access Control (RBAC), Identity and Access Management, Authorization (Computing), Authentications
Skills you'll gain: MITRE ATT&CK Framework, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Operations, IT Automation, Scripting, Python Programming
- Status: Free
EIT Digital
Skills you'll gain: Embedded Software, Embedded Systems, Systems Architecture, Debugging, Computer Architecture, System Programming, Internet Of Things, Application Security, General Networking, Wireless Networks, Operating Systems, Performance Tuning, System Configuration, Hardware Troubleshooting, Real Time Data
Johns Hopkins University
Skills you'll gain: Malware Protection, Cybersecurity, Internet Of Things, Network Monitoring, TCP/IP, Network Security, Network Analysis, Border Gateway Protocol, Threat Detection, Network Routing, Network Protocols, Vulnerability Assessments, Docker (Software)
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Malware Protection, Vulnerability Assessments, Operating Systems, OS Process Management
Northwestern University
Skills you'll gain: Social Media Marketing, Social Media Strategy, Marketing Effectiveness, Marketing Strategies, Performance Measurement, Performance Analysis, Business Metrics, Customer Engagement, Return On Investment, Sales Strategy, Key Performance Indicators (KPIs), Program Management, Integrated Marketing Communications, Law, Regulation, and Compliance, Information Privacy, Data Security
Coursera Project Network
Skills you'll gain: Load Balancing, Network Routing, Amazon Web Services, Servers, Network Monitoring, System Monitoring
University of Michigan
Skills you'll gain: Security Engineering, Computer Security Awareness Training, Cybersecurity, Security Strategy, Policy Analysis, Vulnerability Assessments, Public Policies, Human Factors, Computer Systems, Human Computer Interaction, Usability, Verification And Validation
Coursera Project Network
Skills you'll gain: Amazon S3, Cloud Hosting, Cloud Storage, Version Control, Encryption, Data Storage, Security Controls, Data Management
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Data Integrity, Security Testing, Cybersecurity, Patch Management, Authorization (Computing), Network Security, Cryptography, Extensible Markup Language (XML), System Configuration, Scripting, Encryption, Software Design
Skills you'll gain: Cloud Computing Architecture, Network Planning And Design, Cloud Services, Cloud Infrastructure, Cloud Solutions, Solution Architecture, Google Cloud Platform, Cloud Computing, Cloud Storage, Configuration Management, Cloud Security, Network Infrastructure, Cloud Management, Disaster Recovery
In summary, here are 10 of our most popular cyber security policies courses
- Engineering Practices for Building Quality Software:Â University of Minnesota
- Architecting with Google Kubernetes Engine: Production:Â Google Cloud
- Introduction to Python for Cybersecurity :Â Infosec
- Architecting Smart IoT Devices:Â EIT Digital
- Cybersecurity Fundamentals:Â Johns Hopkins University
- Technical Deep Dive with Incident Response Tools:Â Infosec
- The Business of Social:Â Northwestern University
- Creating Routing Policies to Handle Traffic with AWS Route53:Â Coursera Project Network
- Securing Digital Democracy:Â University of Michigan
- AWS S3 Basics:Â Coursera Project Network