Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security policies and frameworks"
Kennesaw State University
Skills you'll gain: Security Management, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Governance, Business Risk Management, Law, Regulation, and Compliance, Information Management, Cybersecurity, Business Ethics, Performance Measurement, Compliance Management, Governance, Cyber Risk, Organizational Strategy
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), Angular, OAuth, Test Driven Development (TDD), Cryptography, Data Validation, Unit Testing, Vue.JS, Data Security, Authentications, HTML and CSS, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Web Development, Software Testing, Web Applications, JavaScript Frameworks, Front-End Web Development
Multiple educators
Skills you'll gain: Dashboard, Pseudocode, Jupyter, Algorithms, Data Mining, Pandas (Python Package), Data Visualization Software, Correlation Analysis, Web Scraping, NumPy, R Programming, Probability & Statistics, Predictive Modeling, Big Data, Automation, Computer Programming Tools, GitHub, Data Analysis Software, Machine Learning Algorithms, Unsupervised Learning
Juniper Networks
Skills you'll gain: Juniper Network Technologies, Network Security, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Software-Defined Networking, Network Planning And Design, Firewall, Network Troubleshooting, Computer Networking, Virtualization, Network Architecture, Security Software, Network Administration, IT Security Architecture, Remote Access Systems, System Configuration, Network Monitoring, Infrastructure Security, Threat Management, Cybersecurity
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Containerization, Encryption
University of Colorado System
Skills you'll gain: Risk Management Framework, Infrastructure Security, Cyber Security Policies, Continuous Monitoring, Security Management, Cyber Governance, Cybersecurity, Cyber Security Strategy, Security Strategy, Cyber Risk
Skills you'll gain: NIST 800-53, Risk Management Framework, Cyber Risk, Federal Information Security Management Act, Cybersecurity, Risk Management, Security Management, Cyber Governance, Cyber Security Strategy, Operational Risk, Governance Risk Management and Compliance, Security Controls, Continuous Monitoring, Infrastructure Security, Cyber Security Assessment, Enterprise Risk Management (ERM), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
Skills you'll gain: NIST 800-53, Risk Management Framework, Continuous Monitoring, System Monitoring, Security Testing, Threat Management, Security Controls, Security Management, Cyber Security Policies, Cybersecurity, Cyber Risk, Security Strategy, Enterprise Security, Cyber Governance, Data Security, Cyber Security Strategy, Cyber Security Assessment, Information Systems Security, Vulnerability Assessments, Incident Response
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Cyber Governance, Risk Mitigation, Vendor Management, Risk Modeling, Threat Management, Vulnerability Assessments, Security Management, Cyber Risk, Compliance Management, Cyber Security Policies, Cybersecurity, Security Awareness, Cyber Security Strategy
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Security, Cloud Infrastructure, Data Mining, Cloud Platforms, Cloud Computing, Artificial Intelligence, Generative AI, Data Ethics, OpenAI, Cloud Storage, Artificial Intelligence and Machine Learning (AI/ML), Infrastructure As A Service (IaaS), Big Data, Emerging Technologies, Data Analysis, Data Science, Deep Learning, Digital Transformation
Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Cloud Services, Cloud Platforms, General Networking, Windows PowerShell, Cyber Governance, Unix Commands, Cyber Security Strategy
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
In summary, here are 10 of our most popular security policies and frameworks courses
- The Business of Cybersecurity Capstone: Kennesaw State University
- Web Technologies and Security: Codio
- Data Science Foundations: IBM
- Juniper Networks Security Fundamentals: Juniper Networks
- Systems and Application Security: ISC2
- Cybersecurity Policy for Water and Electricity Infrastructures: University of Colorado System
- Cybersecurity Risk Management Framework: Infosec
- Foundations of NIST Cybersecurity Frameworks: Packt
- Introduction to Cybersecurity & Risk Management: University of California, Irvine
- Key Technologies for Business: IBM