Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "manage security policies"
Skills you'll gain: Embedded Software, Performance Tuning, System Programming, Software Development Tools, Embedded Systems, Microarchitecture, Software Development, Hardware Architecture, Debugging, Program Development, Application Security, Computer Architecture, System Configuration, C (Programming Language), Application Development, C++ (Programming Language), Computer Programming, System Requirements, Computer Hardware, Cybersecurity
Emory University
Skills you'll gain: Public Safety and National Security, International Relations, Social Justice, Cultural Diversity, Mental Health, Behavioral Health, Sociology, Social Sciences, Psychology, Media and Communications, Economics
ISC2
Skills you'll gain: Authentications, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Security Controls, IT Security Architecture, User Provisioning, Multi-Factor Authentication, User Accounts, Data Security, Application Security, Information Systems Security, Network Security, Information Assurance, Data Integrity, Network Architecture
University of Michigan
Skills you'll gain: Strategic Decision-Making, Decision Making, Business Ethics, Leadership, Law, Regulation, and Compliance, Ethical Standards And Conduct, Business Strategy, Talent Acquisition, Contract Management, Innovation, Regulatory Compliance, Product Development, Business Risk Management, Labor Law, Business Modeling
- Status: Free
Lund University
Skills you'll gain: Artificial Intelligence, Machine Learning, Social Justice, Algorithms, Socioeconomics, Diversity Awareness, Ethical Standards And Conduct, Automation, Information Privacy, Political Sciences, Security Controls, Governance, Law, Regulation, and Compliance
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Data Integrity, Security Testing, Cybersecurity, Patch Management, Authorization (Computing), Network Security, Cryptography, Extensible Markup Language (XML), System Configuration, Scripting, Encryption, Software Design
University of Illinois Urbana-Champaign
Skills you'll gain: Value Propositions, Entrepreneurship, Market Opportunities, Business Strategy, Market Analysis, Team Building, New Business Development, Business Modeling, Strategic Thinking, Business Development, Customer Analysis, Leadership
University of Colorado Boulder
Skills you'll gain: Supplier Management, Project Schedules, Project Closure, Milestones (Project Management), Scheduling, Procurement, Quality Management, Project Planning, Risk Management, Risk Analysis, Cost Estimation, Risk Mitigation, Project Management, Quality Assurance, Timelines, Budgeting
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Kubernetes, Virtual Machines, Microservices, Infrastructure As A Service (IaaS), Cloud Computing, Cloud Applications, Application Deployment, Data Storage Technologies, Cloud Security, Data Storage, Cloud Services, Cloud Storage, Network Architecture, Google App Engine, Cloud Solutions, Cloud Computing Architecture, Cloud Management
University of Pennsylvania
Skills you'll gain: Law, Regulation, and Compliance, Regulation and Legal Compliance, Adjudication, Regulatory Compliance, Regulatory Requirements, Public Safety and National Security
University of California, Irvine
Skills you'll gain: Financial Statements, Financial Accounting, Accounting, Cash Flows, Income Statement, Profit and Loss (P&L) Management, Financial Reporting, Financial Analysis, Balance Sheet, Finance, Expense Management, Budgeting, Forecasting, Business Planning
The State University of New York
Skills you'll gain: Persuasive Communication, Emergency Response, Conflict Management, Crisis Intervention, Cultural Responsiveness, Leadership, Collaboration, Teamwork, Interviewing Skills, Safety and Security, Communication, Public Affairs, Cultural Sensitivity, Risk Management, Cultural Diversity, Professional Development, Interpersonal Communications, Media and Communications, Diversity Awareness, Rapport Building
In summary, here are 10 of our most popular manage security policies courses
- Arm Cortex-M Architecture and Software Development: Arm
- Understanding Violence: Emory University
- Access Controls : ISC2
- Making Successful Decisions through the Strategy, Law & Ethics Model: University of Michigan
- Artificial Intelligence: Ethics & Societal Challenges: Lund University
- OWASP Top 10 - 2021: Infosec
- Entrepreneurship I: Laying the Foundation: University of Illinois Urbana-Champaign
- Project Planning and Execution: University of Colorado Boulder
- Preparing for Google Cloud Certification: Cloud Architect Professional Certificate 日本語版: Google Cloud
- Nuts and Bolts of U.S. Immigration Law: University of Pennsylvania