Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security policies"
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Command-Line Interface, Firewall, System Configuration, Security Management, Network Security, Virtual Machines, Virtualization
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Kubernetes, Virtual Machines, Microservices, Infrastructure As A Service (IaaS), Cloud Computing, Cloud Applications, Application Deployment, Data Storage Technologies, Cloud Security, Data Storage, Cloud Services, Cloud Storage, Network Architecture, Google App Engine, Terraform, Cloud Computing Architecture, Cloud Management
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications
University of Illinois Urbana-Champaign
Skills you'll gain: Big Data, Apache Spark, Apache Hadoop, Distributed Computing, Data Storage, Data Processing, NoSQL, Apache Kafka, Real Time Data, Cloud Computing, Databases, Analytics, Deep Learning, Scalability, Machine Learning Algorithms, Graph Theory, Machine Learning, Algorithms
Scrimba
Skills you'll gain: Image Analysis, OpenAI, Cloud Applications, Generative AI, Cloud API, Application Deployment, API Gateway, ChatGPT, Data Ethics, Cloud Computing, Development Environment, Open Source Technology, Application Programming Interface (API), Performance Testing, Artificial Intelligence, Serverless Computing, Application Security, Artificial Intelligence and Machine Learning (AI/ML), User Interface and User Experience (UI/UX) Design, JavaScript Frameworks
Skills you'll gain: Generative AI, Google Cloud Platform, Cybersecurity, Cloud Security, Artificial Intelligence
Microsoft
Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Security Controls, Threat Detection, Malware Protection, Application Performance Management, Event Monitoring, Incident Response, Incident Management, Virtual Machines, Anomaly Detection, Query Languages
Duke University
Skills you'll gain: Blockchain, FinTech, Operational Risk, Scalability, Security Testing, Risk Management, Financial Regulations, Risk Analysis, Application Security, Cybersecurity, Digital Assets, Governance, Environmental Social And Corporate Governance (ESG), Emerging Technologies
University of Colorado System
Skills you'll gain: Software Design, Software Development Life Cycle, Application Security, Technical Design, Security Engineering, Software Architecture, Software Development Methodologies, Conceptual Design, Waterfall Methodology, Requirements Analysis, Agile Methodology
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Cyber Threat Hunting, Intrusion Detection and Prevention, Threat Management, Incident Response, Event Monitoring, Computer Security Incident Management, Network Analysis, Cybersecurity, Anomaly Detection, Network Security, Network Monitoring, Network Protocols, SQL
- Status: Free
Yale University
Skills you'll gain: Primary Care, Health Systems, Health Care, Care Coordination, Nursing and Patient Care, Preventative Care, Nursing Practices, Patient Education and Support, Cultural Responsiveness, Advocacy, Public Policies, Diversity Awareness, Policy Development, Social Justice, Education and Training
University of Minnesota
Skills you'll gain: Test Automation, Regression Testing, Software Testing, Software Development Tools, Unit Testing, Software Engineering Tools, Test Tools, JUnit, Acceptance Testing, Code Coverage, Security Testing, Verification And Validation, Test Case, Test Data, Debugging, Software Quality Assurance, Automation, Functional Requirement, Application Security, Vulnerability Scanning
In summary, here are 10 of our most popular security policies courses
- Check Point Jump Start: Maestro Hyperscale Network Security: Check Point Software Technologies Ltd.
- Preparing for Google Cloud Certification: Cloud Architect Professional Certificate 日本語版: Google Cloud
- Asymmetric Cryptography and Key Management: University of Colorado System
- Cloud Computing Applications, Part 2: Big Data and Applications in the Cloud: University of Illinois Urbana-Champaign
- AI Engineering: Scrimba
- Put It All Together: Prepare for a Cloud Security Analyst Job: Google Cloud
- Manage Security Operations: Microsoft
- Decentralized Finance (DeFi) Opportunities and Risks: Duke University
- Software Design as an Element of the Software Development Lifecycle: University of Colorado System
- Threat Analysis: Cisco Learning and Certifications