Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security policies"
Skills you'll gain: Robotic Process Automation, Web Scraping, User Interface (UI), Business Process Automation, Automation, Email Security, UI Components, Test Automation, User Interface (UI) Design, Data Import/Export, Excel Macros, Scripting, IT Automation, Data Cleansing, Software Development Tools, Data Integration, Integrated Development Environments, Unstructured Data, Application Deployment, Configuration Management
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Cybersecurity, Dependency Analysis, Docker (Software), Git (Version Control System)
- Status: Free
Skills you'll gain: ChatGPT, Cyber Threat Hunting, Cybersecurity, Malware Protection, Incident Response, Threat Detection, Security Information and Event Management (SIEM), Network Analysis, Network Protocols, Network Security, Generative AI
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection, Data Sharing
- Status: Free
University of Western Australia
Skills you'll gain: Diversity Awareness, Diversity Equity and Inclusion Initiatives, Social Justice, Cultural Diversity, Sociology, Law, Regulation, and Compliance, Research
LearnKartS
Skills you'll gain: Penetration Testing, Network Security, Malware Protection, Cybersecurity, Threat Detection, Information Systems Security, Cyber Threat Intelligence, Intrusion Detection and Prevention, Firewall, Cyber Attacks, Vulnerability Assessments, Internet Of Things, Encryption, Network Analysis
Microsoft
Skills you'll gain: Microsoft 365, Microsoft Teams, Productivity Software, Microsoft Power Automate/Flow, Operational Efficiency, Microsoft Windows, Automation, Cloud-Based Integration, Microsoft Outlook, Data Security, Microsoft Word, Document Management, Microsoft PowerPoint, Microsoft Excel
University of California, Davis
Skills you'll gain: Data Storytelling, Data Presentation, Key Performance Indicators (KPIs), Dashboard, Interactive Data Visualization, Tableau Software, Data Visualization Software, Data Visualization, Data-Driven Decision-Making, Storytelling, Performance Metric, Performance Measurement, Performance Analysis, Business Metrics, Statistical Reporting, Customer Analysis, Requirements Analysis, Presentations, Public Speaking
Skills you'll gain: Google Cloud Platform, Amazon Web Services, Virtual Private Networks (VPN), Identity and Access Management, Cloud Infrastructure, Cloud Computing Architecture, Virtual Local Area Network (VLAN), General Networking, Network Routing, Firewall, Wide Area Networks, User Accounts
Skills you'll gain: MITRE ATT&CK Framework, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Operations, IT Automation, Scripting, Python Programming
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Information Systems Security, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Personally Identifiable Information, Cloud Security
Microsoft
Skills you'll gain: Cascading Style Sheets (CSS), GitHub, C# (Programming Language), Secure Coding, HTML and CSS, User Interface and User Experience (UI/UX) Design, Figma (Design Software), Version Control, Open Web Application Security Project (OWASP), Git (Version Control System), Object Oriented Programming (OOP), Web Development, Web Design and Development, Debugging, Mockups, Authentications, Front-End Web Development, User Interface (UI), Programming Principles, User Interface (UI) Design
In summary, here are 10 of our most popular security policies courses
- Robotic Process Automation (RPA):Â UiPath
- Exploiting and Securing Vulnerabilities in Java Applications:Â University of California, Davis
- Applied ChatGPT for Cybersecurity:Â Infosec
- Proactive Computer Security:Â University of Colorado System
- Gender Equality:Â University of Western Australia
- System and Network Security:Â LearnKartS
- The Microsoft 365 Ecosystem:Â Microsoft
- Creating Dashboards and Storytelling with Tableau:Â University of California, Davis
- Google Cloud IAM and Networking for AWS Professionals:Â Google Cloud
- Introduction to Python for Cybersecurity :Â Infosec