Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "manage security policies"
Queen Mary University of London
Skills you'll gain: Qualitative Research, Proposal Development, Market Research, Research Reports, Data Collection, Research Design, Research Methodologies, Data Analysis, Statistical Hypothesis Testing, Survey Creation, Statistical Analysis, Correlation Analysis, Marketing Management, Marketing, Report Writing, Quantitative Research, Research, Focus Group, Regression Analysis, Business Research
Coursera Project Network
Skills you'll gain: HubSpot CRM, Customer Relationship Management (CRM) Software, Customer Data Management, Email Marketing, Marketing Materials, Customer Communications Management, Sales Pipelines, Dashboard, Team Building
- Status: Free
Yale University
Skills you'll gain: Crisis Management, Financial Policy, Mortgage Loans, Financial Regulation, Public Policies, Financial Market, International Finance, Banking, Economics, Psychology
Lund University
Skills you'll gain: Law, Regulation, and Compliance, International Relations, Regulatory Compliance, Business Economics, Compliance Management, Business Administration, E-Commerce, Public Policies, Labor Law, Organizational Structure, Financial Regulation, Economics, Tax Laws, Contract Review, Higher Education, Governance, Decision Making
- Status: Free
Skills you'll gain: Telecommuting, Virtual Teams, Team Management, Human Resources Management and Planning, Culture Transformation, Performance Metric, Leadership and Management, Organizational Strategy, Business Transformation, Organizational Leadership, Change Management, Performance Management, Organizational Structure, Adaptability, Collaboration, Communication Strategies
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, HTML and CSS, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Responsive Web Design, Hypertext Markup Language (HTML), Application Development, TCP/IP, Scripting, MySQL
Skills you'll gain: Incident Response, Business Continuity Planning, Continuous Monitoring, Disaster Recovery, Threat Management, Risk Analysis, Risk Mitigation, Vulnerability Scanning, Security Information and Event Management (SIEM), Vulnerability Assessments, Investigation, Penetration Testing
Infosec
Skills you'll gain: File Systems, Criminal Investigation and Forensics, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, File Management, Operating Systems, Data Structures, Data Ethics, General Networking, Data Validation, Record Keeping, Data Storage Technologies, Data Integrity, Data Analysis Software, User Accounts, USB, Systems Analysis
Skills you'll gain: Cloud Development, Image Analysis, Anomaly Detection, Microsoft Azure, Cloud Storage, Data Storage, Cloud Applications, Computer Vision, Text Mining, Microsoft Development Tools, Unsupervised Learning, Data Storage Technologies, Natural Language Processing, Data Ethics, Continuous Deployment, Application Deployment, Virtual Machines, ASP.NET, GitHub, Generative AI
University of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, General Networking, Computer Networking, Encryption, Web Development, Innovation
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Human Factors (Security), Threat Management, Security Awareness, Cybersecurity, Cyber Risk, Cyber Attacks, Security Strategy, Compliance Training, Employee Training
- Status: Free
EIT Digital
Skills you'll gain: Embedded Software, Embedded Systems, Systems Architecture, Debugging, Computer Architecture, System Programming, Internet Of Things, Application Security, General Networking, Wireless Networks, Operating Systems, Performance Tuning, System Configuration, Hardware Troubleshooting, Real Time Data
In summary, here are 10 of our most popular manage security policies courses
- Market Research:Â Queen Mary University of London
- Introduction to CRM with HubSpot:Â Coursera Project Network
- The Global Financial Crisis:Â Yale University
- European Business Law: Understanding the Fundamentals:Â Lund University
- How to Manage a Remote Team:Â GitLab
- Akamai Customer Consulting and Support:Â Akamai Technologies, Inc.
- Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery :Â ISC2
- Computer Forensics:Â Infosec
- Building AI Cloud Apps with Microsoft Azure:Â Microsoft
- Internet History, Technology, and Security:Â University of Michigan