Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "manage security policies"
University of Michigan
Skills you'll gain: Data Ethics, Information Privacy, Personally Identifiable Information, Data Security, Data Governance, Ethical Standards And Conduct, Big Data, Law, Regulation, and Compliance, Data Analysis, Social Sciences, Data-Driven Decision-Making, Diversity Awareness
University of Pennsylvania
Skills you'll gain: Generative AI, Big Data, Machine Learning, Tensorflow, Artificial Intelligence, Deep Learning, Algorithms, Process Optimization, Data Analysis, Artificial Neural Networks, Natural Language Processing, Automation
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security), Personally Identifiable Information
Skills you'll gain: Blockchain, Digital Assets, FinTech, Plan Execution, Business Strategies, Business Strategy, Strategic Decision-Making, Payment Systems, Governance, Feasibility Studies, Financial Services, Financial Regulation, Work Breakdown Structure, Project Implementation, Market Opportunities, Banking Services, Cryptography, Design, Emerging Technologies, Stakeholder Management
- Status: Free
The University of Chicago
Skills you'll gain: Software-Defined Networking, Computer Networking, Virtualization, Network Architecture, Network Administration, Network Switches, Network Routing, Network Security, Wide Area Networks, Data Centers, Application Programming Interface (API), Scalability
University of Alberta
Skills you'll gain: Sprint Planning, Project Risk Management, User Story, Backlogs, Agile Methodology, User Requirements Documents, Functional Requirement, Agile Project Management, Requirements Analysis
University of Illinois Urbana-Champaign
Skills you'll gain: Organizational Change, Organizational Leadership, Business Management, Business Ethics, Change Management, Organizational Effectiveness, Strategic Leadership, Leadership, Decision Making, Industrial and Organizational Psychology, Influencing, Strategic Thinking, Culture, People Analytics
- Status: Free
UNSW Sydney (The University of New South Wales)
Skills you'll gain: Systems Engineering, Engineering Management, Conceptual Design, Systems Design, Requirements Analysis, Systems Development Life Cycle, Requirements Elicitation, Systems Architecture, Systems Integration, System Design and Implementation, Technical Design, Configuration Management, Prototyping, Verification And Validation
Google
Skills you'll gain: Computer Networking, IT Infrastructure, Network Troubleshooting, OSI Models, Systems Administration, Network Security, Routing Protocols, Cybersecurity, Microsoft Windows, Cyber Attacks, Security Strategy, File Systems, Disaster Recovery, Lightweight Directory Access Protocols, Remote Access Systems, Linux, Technical Support, Help Desk Support, Information Technology, Software Installation
Google Cloud
Skills you'll gain: Gmail, Google Workspace, Email Security, Business Correspondence, Productivity Software, Organizational Skills, Business Communication, Cloud-Based Integration, Writing, Data Sharing
Skills you'll gain: Quality Management, Cost Management, Backlogs, Project Closure, Project Planning, Sprint Retrospectives, Project Scoping, Team Leadership, Project Management Life Cycle, Agile Project Management, Communication Planning, Continuous Improvement Process, Process Improvement, Project Management Software, Project Management, Change Control, Project Controls, Agile Methodology, Requirements Analysis, Change Management
University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Information Systems Security, Cybersecurity, Encryption, Virtual Private Networks (VPN), Cyber Attacks, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
In summary, here are 10 of our most popular manage security policies courses
- Data Science Ethics:Â University of Michigan
- AI Fundamentals for Non-Data Scientists:Â University of Pennsylvania
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Blockchain Revolution in Financial Services:Â INSEAD
- Software Defined Networking:Â The University of Chicago
- Agile Planning for Software Products:Â University of Alberta
- Managing the Organization:Â University of Illinois Urbana-Champaign
- Introduction to Systems Engineering:Â UNSW Sydney (The University of New South Wales)
- IT Support Google:Â Google
- Gmail:Â Google Cloud