Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security policies"
Instituto Tecnológico de Aeronáutica
Skills you'll gain: User Story, Agile Software Development, Backlogs, Agile Methodology, Scrum (Software Development), Sprint Retrospectives, Test Driven Development (TDD), Agile Project Management, Requirements Analysis, Sprint Planning, Software Development Methodologies, Software Engineering, Continuous Integration
University of Michigan
Skills you'll gain: Django (Web Framework), Object-Relational Mapping, Model View Controller, SQL, Databases, Object Oriented Programming (OOP), Web Applications, Data Modeling, Application Security, Web Development, Python Programming, HTML and CSS
Skills you'll gain: Microsoft Power Platform, Microsoft Power Automate/Flow, Power BI, Dashboard, Data Visualization, Data Integration, Business Intelligence, Business Process Automation, Productivity Software, Application Development, Microsoft 365, Platform As A Service (PaaS), Performance Analysis, Workflow Management, Data Security, Data Store, Cloud Applications, Business Process, Microsoft Teams, Data Analysis Software
Skills you'll gain: Cloud Development, Microsoft Azure, Cloud Storage, Data Storage, Serverless Computing, Cloud Security, Virtual Machines, Data Storage Technologies, CI/CD, Continuous Deployment, Development Environment, Cloud Management, Application Deployment, Cloud Applications, Data Security, Cloud Computing, Microsoft Power Automate/Flow, Event-Driven Programming, Docker (Software), C# (Programming Language)
University of California, Irvine
Skills you'll gain: Network Security, Computer Hardware, Computer Systems, Information Technology, Networking Hardware, General Networking, Network Protocols, Operating Systems, Software Systems, Microsoft Windows, Mac OS
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Cybersecurity, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
Skills you'll gain: Information Technology, Computer Hardware, Cloud Computing, Network Troubleshooting, Software Installation, Technical Support and Services, Cybersecurity, Cloud Infrastructure, Hardware Troubleshooting, Data Storage, General Networking, Operating Systems, Computer Security Awareness Training, Serverless Computing, Computer Programming, Databases
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Economics, Economic Development, Socioeconomics, Policy Analysis, Financial Policy, Data Analysis, Public Policies, International Relations, Environment and Resource Management, Investments, Behavioral Economics, Sustainability Reporting, Data Collection
University of Minnesota
Skills you'll gain: Business Systems Analysis, Systems Analysis, Requirements Analysis, Business Requirements, User Requirements Documents, Requirements Management, Business Process, Business Process Modeling, Feasibility Studies, Decision Making
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
University of Glasgow
Skills you'll gain: Diversity Awareness, Pedagogy, Education and Training, Differentiated Instruction, Teaching, Disabilities, Cultural Diversity, Instructional Strategies, Diversity Equity and Inclusion Initiatives, Curriculum Planning, Cultural Responsiveness, Social Justice, Student-Centred Learning, Student Engagement, Policty Analysis, Research, and Development
Northwestern University
Skills you'll gain: Social Media Marketing, Social Media Strategy, Marketing Effectiveness, Marketing Strategies, Performance Measurement, Performance Analysis, Business Metrics, Customer Engagement, Return On Investment, Sales Strategy, Key Performance Indicators (KPIs), Program Management, Integrated Marketing Communications, Law, Regulation, and Compliance, Information Privacy, Data Security
In summary, here are 10 of our most popular cyber security policies courses
- Princípios de Desenvolvimento Ágil de Software: Instituto Tecnológico de Aeronáutica
- Building Web Applications in Django: University of Michigan
- Microsoft Power Platform Fundamentals PL-900 Exam Prep: Microsoft
- Microsoft Azure Developer Associate (AZ-204) Exam Prep: Microsoft
- Computer Hardware and Software: University of California, Irvine
- Hacking and Patching: University of Colorado System
- Information Technology (IT) Fundamentals for Everyone: IBM
- Earth Economics: Erasmus University Rotterdam
- Analysis for Business Systems: University of Minnesota
- Identifying Security Vulnerabilities in C/C++Programming: University of California, Davis