Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security policies and frameworks"
Skills you'll gain: System Configuration, Configuration Management, Cybersecurity, Security Awareness, Data Security, Security Controls, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Information Technology Operations, System Monitoring, Key Management, General Networking, Data Integrity
Juniper Networks
Skills you'll gain: Juniper Network Technologies, Network Security, Network Planning And Design, Network Administration, IT Security Architecture, Firewall, System Configuration, Cybersecurity, Command-Line Interface, Configuration Management
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Infrastructure As A Service (IaaS), Cloud Applications, Cloud Security, Kubernetes, Cloud Computing, OAuth, Security Controls, Cloud Storage, Network Infrastructure, Containerization, Threat Management, Application Security, Virtual Private Networks (VPN), Data Security, Authorization (Computing)
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Cyber Governance, Risk Mitigation, Vendor Management, Risk Modeling, Threat Management, Vulnerability Assessments, Security Management, Cyber Risk, Compliance Management, Cyber Security Policies, Cybersecurity, Security Awareness, Cyber Security Strategy
- Status: [object Object]
Google
Skills you'll gain: Computer Networking, Network Troubleshooting, Package and Software Management, Systems Administration, Cloud Infrastructure, IT Infrastructure, TCP/IP, Desktop Support, Network Security, Network Architecture, Computer Hardware, Linux, Encryption, Microsoft Windows, Lightweight Directory Access Protocols, Cybersecurity, Security Awareness, Technical Support, Software Installation, Help Desk Support
Skills you'll gain: Incident Response, Data Centers, DevSecOps, Continuous Monitoring, System Monitoring, Threat Detection, Infrastructure Security, Microsoft Servers, IT Security Architecture, Information Technology Operations, Security Management, Payment Card Industry (PCI) Data Security Standards, Windows Servers, Microsoft Windows, IT Infrastructure, Systems Administration, Security Information and Event Management (SIEM), Security Testing, Disaster Recovery, IT Automation
Skills you'll gain: Open Web Application Security Project (OWASP), Istio, Software Development Life Cycle, Linux Commands, Unit Testing, Application Deployment, Kubernetes, NoSQL, Bash (Scripting Language), MongoDB, Shell Script, Django (Web Framework), Object-Relational Mapping, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Jupyter, Grafana
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
The Hong Kong University of Science and Technology
Skills you'll gain: Financial Regulation, Financial Regulations, Bank Regulations, FinTech, Financial Services, Law, Regulation, and Compliance, Mobile Banking, Regulatory Requirements, Compliance Management, Data Security, Cybersecurity, Insurance, Blockchain, Security Controls, Investigation
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Server Administration, Authorization (Computing), Network Administration, Information Systems Security, Authentications
Skills you'll gain: Network Security, Encryption, Cybersecurity, Security Awareness, Cyber Attacks, Security Management, Security Strategy, Threat Detection, Firewall, Wireless Networks, Technical Support, Malware Protection, Authentications, Multi-Factor Authentication, Authorization (Computing), Generative AI
In summary, here are 10 of our most popular security policies and frameworks courses
- Security Operations: ISC2
- Juniper Networks Security Concepts and Initial Configuration: Juniper Networks
- Security in Google Cloud: Google Cloud
- Introduction to Cybersecurity & Risk Management: University of California, Irvine
- Google IT Support: Google
- Data Center Security Management with Microsoft System Center: EDUCBA
- IBM Back-End Development: IBM
- Operating Systems: Overview, Administration, and Security: IBM
- FinTech Security and Regulation (RegTech): The Hong Kong University of Science and Technology
- Computer Networks and Network Security: IBM