Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security policies"
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Cloud Security, Microsoft Azure, Cloud Infrastructure, Cloud Computing, Infrastructure Security, Network Security, Private Cloud, Threat Detection, Public Cloud, Firewall, Security Management, Identity and Access Management
Microsoft
Skills you'll gain: Cascading Style Sheets (CSS), GitHub, C# (Programming Language), Secure Coding, HTML and CSS, User Interface and User Experience (UI/UX) Design, Figma (Design Software), Version Control, Open Web Application Security Project (OWASP), Git (Version Control System), Object Oriented Programming (OOP), Web Development, Web Design and Development, Debugging, Mockups, Authentications, Front-End Web Development, User Interface (UI), Programming Principles, User Interface (UI) Design
Microsoft
Skills you'll gain: Microsoft 365, Microsoft Teams, Productivity Software, Microsoft Power Automate/Flow, Operational Efficiency, Microsoft Windows, Automation, Cloud-Based Integration, Microsoft Outlook, Data Security, Microsoft Word, Document Management, Microsoft PowerPoint, Microsoft Excel
- Status: Free
The University of Sydney
Skills you'll gain: Blockchain, Distributed Computing, Security Engineering, Network Security, Scalability, Cryptography, Data Integrity, Transaction Processing, Algorithms, Network Model, Theoretical Computer Science
Infosec
Skills you'll gain: Criminal Investigation and Forensics, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, Data Ethics, General Networking, Record Keeping, Data Integrity, File Management, Ethical Standards And Conduct, Encryption, Technical Writing, Linux Commands
Sciences Po
Skills you'll gain: International Relations, Cultural Diversity, Social Sciences, Demography, Environmental Issue, Sociology, Social Justice, Political Sciences, Policty Analysis, Research, and Development, Governance, Law, Regulation, and Compliance, Public Policies, Economics
- Status: Free
Institut Mines-Télécom
Skills you'll gain: Network Engineering, Wireless Networks, Network Security, Network Architecture, Computer Networking, Mobile Security, Network Protocols, Network Performance Management, Network Planning And Design, Digital Communications, Dataflow, Capacity Management
Skills you'll gain: Database Management, Database Architecture and Administration, Relational Databases, Database Systems, IBM DB2, MySQL, Performance Tuning, Stored Procedure, PostgreSQL, Disaster Recovery, Systems Administration, Data Storage Technologies, System Monitoring, Authorization (Computing), Authentications, User Accounts
- Status: Free
Coursera Instructor Network
Skills you'll gain: Information Privacy, General Data Protection Regulation (GDPR), Personally Identifiable Information, Data Security, Data Governance, Data Ethics, Law, Regulation, and Compliance, Data Loss Prevention, Data Management, Security Controls, Regulatory Compliance, Compliance Management, Compliance Training, Data Sharing, Security Strategy, Regulatory Requirements, Data Processing, Risk Management, Employee Training, Risk Analysis
Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Security, Cloud Computing, Cybersecurity, Infrastructure Security, Authentications, Authorization (Computing), Cloud Services, Network Security, Data Storage, Threat Detection, Identity and Access Management, Encryption
Microsoft
Skills you'll gain: Database Management, C# (Programming Language), Microsoft SQL Servers, SQL, ASP.NET, Load Balancing, Relational Databases, Role-Based Access Control (RBAC), Scalability, Object Oriented Programming (OOP), Databases, Authentications, Debugging, Database Development, Database Design, .NET Framework, Graph Theory, Back-End Web Development, Program Development, Data Structures
Skills you'll gain: Embedded Software, Performance Tuning, System Programming, Software Development Tools, Embedded Systems, Microarchitecture, Software Development, Hardware Architecture, Debugging, Program Development, Application Security, Computer Architecture, System Configuration, C (Programming Language), Application Development, C++ (Programming Language), Computer Programming, System Requirements, Computer Hardware, Cybersecurity
In summary, here are 10 of our most popular cyber security policies courses
- Check Point Jump Start: Cloud Security :Â Check Point Software Technologies Ltd.
- Microsoft Front-End Developer:Â Microsoft
- The Microsoft 365 Ecosystem:Â Microsoft
- Blockchain Scalability and its Foundations in Distributed Systems:Â The University of Sydney
- Digital Forensics Concepts:Â Infosec
- International migrations: a global issue:Â Sciences Po
- 4G Network Fundamentals: Institut Mines-Télécom
- Relational Database Administration (DBA):Â IBM
- Data Privacy and Protection Standards:Â Coursera Instructor Network
- Trust and Security with Google Cloud:Â Google Cloud