Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security policies"
University of Michigan
Skills you'll gain: Django (Web Framework), Object-Relational Mapping, Model View Controller, SQL, Databases, Object Oriented Programming (OOP), Web Applications, Data Modeling, Application Security, Web Development, Python Programming, HTML and CSS
University of California, Irvine
Skills you'll gain: Network Security, Computer Hardware, Computer Systems, Information Technology, Networking Hardware, General Networking, Network Protocols, Operating Systems, Software Systems, Microsoft Windows, Mac OS
Skills you'll gain: Security Information and Event Management (SIEM), Splunk, Threat Detection, System Monitoring, Cybersecurity, Event Monitoring, Continuous Monitoring, Incident Response, Data Analysis Software, Data Management, Data Storage, Software Installation, Query Languages, User Interface (UI)
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Cybersecurity, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Economics, Economic Development, Socioeconomics, Policy Analysis, Financial Policy, Data Analysis, Public Policies, International Relations, Environment and Resource Management, Investments, Behavioral Economics, Sustainability Reporting, Data Collection
ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Data Security, Cybersecurity, Authentications, Network Security, Data Integrity, Algorithms
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
University of Glasgow
Skills you'll gain: Diversity Awareness, Pedagogy, Education and Training, Differentiated Instruction, Teaching, Disabilities, Cultural Diversity, Instructional Strategies, Diversity Equity and Inclusion Initiatives, Curriculum Planning, Cultural Responsiveness, Social Justice, Student-Centred Learning, Student Engagement, Policty Analysis, Research, and Development
Northwestern University
Skills you'll gain: Social Media Marketing, Social Media Strategy, Marketing Effectiveness, Marketing Strategies, Performance Measurement, Performance Analysis, Business Metrics, Customer Engagement, Return On Investment, Sales Strategy, Key Performance Indicators (KPIs), Program Management, Integrated Marketing Communications, Law, Regulation, and Compliance, Information Privacy, Data Security
Cisco Learning and Certifications
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Threat Detection, General Networking, Network Security, Cybersecurity, Cyber Security Policies, Infrastructure Security, Computer Networking, Technical Services, Technical Support and Services
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), Angular, OAuth, Test Driven Development (TDD), Cryptography, Data Validation, Unit Testing, Vue.JS, Data Security, Authentications, HTML and CSS, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Web Development, Software Testing, Web Applications, JavaScript Frameworks, Front-End Web Development
Skills you'll gain: Oracle Cloud, Identity and Access Management, Oracle Databases, Cloud Infrastructure, Database Software, Cloud Computing Architecture, Cloud Security, Cloud Computing, Infrastructure As A Service (IaaS), Cloud Storage, Data Storage Technologies, Authentications, Authorization (Computing), Scalability
In summary, here are 10 of our most popular cyber security policies courses
- Building Web Applications in Django:Â University of Michigan
- Computer Hardware and Software:Â University of California, Irvine
- Introduction to SIEM (Splunk):Â EDUCBA
- Hacking and Patching:Â University of Colorado System
- Earth Economics:Â Erasmus University Rotterdam
- Cryptography :Â ISC2
- Identifying Security Vulnerabilities in C/C++Programming:Â University of California, Davis
- Diversity and Inclusion in Education:Â University of Glasgow
- The Business of Social:Â Northwestern University
- Threat Response:Â Cisco Learning and Certifications