Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security policies"
Skills you'll gain: Information Technology, Computer Hardware, Cloud Computing, Network Troubleshooting, Software Installation, Technical Support and Services, Cybersecurity, Cloud Infrastructure, Hardware Troubleshooting, Data Storage, General Networking, Operating Systems, Computer Security Awareness Training, Serverless Computing, Computer Programming, Databases
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Kubernetes, Virtual Machines, Microservices, Infrastructure As A Service (IaaS), Cloud Computing, Cloud Applications, Application Deployment, Data Storage Technologies, Cloud Security, Data Storage, Cloud Services, Cloud Storage, Network Architecture, Google App Engine, Cloud Solutions, Cloud Computing Architecture, Cloud Management
Skills you'll gain: Cloud Computing Architecture, Network Planning And Design, Cloud Services, Cloud Infrastructure, Cloud Solutions, Solution Architecture, Google Cloud Platform, Cloud Computing, Cloud Storage, Configuration Management, Cloud Security, Network Infrastructure, Cloud Management, Disaster Recovery
Universidad de los Andes
Skills you'll gain: Cryptography, Security Requirements Analysis, Human Factors (Security), Encryption, Data Security, Security Management, Personally Identifiable Information, Threat Management, ISO/IEC 27001, Information Assurance, Cyber Attacks, Cybersecurity, Security Awareness, Law, Regulation, and Compliance
- Status: Free
University of Pennsylvania
Skills you'll gain: Market Dynamics, Economics, Socioeconomics, Supply And Demand, Market Analysis, Competitive Analysis, Public Policies, Policty Analysis, Research, and Development, Consumer Behaviour, Cost Benefit Analysis
Board Infinity
Skills you'll gain: Spring Boot, Restful API, Model View Controller, Spring Framework, Java, Java Programming, Web Services, Back-End Web Development, Data Structures, Application Security, Application Development
Skills you'll gain: Requirements Elicitation, Business Analysis, Requirements Analysis, Digital Transformation, Business Process, Gap Analysis, Business Requirements, Business Transformation, Stakeholder Engagement, Stakeholder Communications, Project Management, Change Management
Google
Skills you'll gain: Package and Software Management, IT Infrastructure, Network Security, Network Troubleshooting, Systems Administration, OS Process Management, Computer Networking, Desktop Support, Information Systems Security, Computer Security Awareness Training, Application Security, TCP/IP, Cybersecurity, Remote Access Systems, Network Administration, Technical Support, Active Directory, Server Administration, Computer Hardware, Information Technology
Illinois Tech
Skills you'll gain: Firewall, Microsoft Windows, System Support, Operating Systems, Event Monitoring, Linux, Linux Administration, System Configuration, Network Security, Authorization (Computing), System Monitoring, System Software, Hardening, Computer Security, Systems Administration, File Management, Data Security, Security Information and Event Management (SIEM), Identity and Access Management
DeepLearning.AI
Skills you'll gain: Database Design, Software Design Patterns, Database Systems, Software Design, Software Architecture, Software Systems, System Design and Implementation, Software Development, Artificial Intelligence, Secure Coding, Application Programming Interface (API), Performance Tuning, Restful API
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Scalability, Network Security, Identity and Access Management, Cloud Management, System Monitoring, Network Monitoring, Continuous Monitoring, Containerization, Capacity Management, Application Performance Management, Application Security
University of Minnesota
Skills you'll gain: Software Design Patterns, Software Engineering, Application Security, Object Oriented Design, Software Architecture, Software Quality (SQA/SQC), Threat Modeling, Maintainability, Code Review, Quality Assurance, Continuous Integration, CI/CD, Software Technical Review, Test Driven Development (TDD), Software Development Tools, Software Documentation, Version Control
In summary, here are 10 of our most popular cyber security policies courses
- Information Technology (IT) Fundamentals for Everyone: IBM
- Preparing for Google Cloud Certification: Cloud Architect Professional Certificate 日本語版: Google Cloud
- Preparing for your Professional Cloud Architect Journey: Google Cloud
- Principios y Regulaciones de Seguridad de la Información: Universidad de los Andes
- Microeconomics: When Markets Fail: University of Pennsylvania
- Data Structures & Backend with Java: Board Infinity
- Introduction to Business Analysis: IBM
- Google IT Support: Google
- OS Security: Illinois Tech
- AI-Powered Software and System Design: DeepLearning.AI