Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber security policies"
University of Illinois Urbana-Champaign
Skills you'll gain: Supply And Demand, Economics, Market Dynamics, Policy Analysis, Business Economics, Business, Public Policies, Business Operations, Price Negotiation, Social Studies, Consumer Behaviour, Political Sciences, Social Sciences, Business Strategy, Market Analysis, Revenue Management, Decision Making, Entrepreneurship, Socioeconomics, Resource Allocation
Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Infrastructure as Code (IaC), Amazon CloudWatch, AWS CloudFormation, Software Development Life Cycle, CI/CD, Amazon Web Services, Professional Networking, IT Automation, Cloud Computing, Amazon S3, Extract, Transform, Load, DevOps, Data-Driven Decision-Making, Software Architecture, Cloud Computing Architecture, Amazon DynamoDB, Cloud Infrastructure, Web Applications, Leadership Development
- Status: Free
University of London
Skills you'll gain: Diplomacy, International Relations, Political Sciences, Policy Analysis, Social Sciences, Cultural Diversity, Intercultural Competence, Public Policies
- Status: Free
Infosec
Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Information Systems Security, Application Security, Security Management, Computer Security Incident Management, Network Security, IT Security Architecture, Threat Management, Security Information and Event Management (SIEM), Security Controls, Identity and Access Management, Cryptography, Threat Detection, Cyber Security Policies, Data Security, Encryption, Security Strategy, Incident Management
University at Buffalo
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Network Protocols, FinTech, Virtual Environment, Data Integrity, Emerging Technologies, Data Security, Data Validation, User Accounts
- Status: Free
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Mathematical Software, Algorithms
University of London
Skills you'll gain: Responsive Web Design, HTML and CSS, Web Design, Human Computer Interaction, Interaction Design, jQuery, Web Design and Development, Bootstrap (Front-End Framework), Hypertext Markup Language (HTML), User Experience Design, User Accounts, MongoDB, Web Applications, Interactive Data Visualization, JavaScript Frameworks, Technical Communication, Web Development Tools, Command-Line Interface, User Interface (UI), Prototyping
- Status: Free
Yale University
Skills you'll gain: Political Sciences, Policy Analysis, Social Justice, Public Policies, Social Sciences, Law, Regulation, and Compliance, Governance, Ethical Standards And Conduct, Socioeconomics, Economics
Skills you'll gain: Bash (Scripting Language), Linux Commands, Command-Line Interface, Operating Systems, SQL, Linux, Cybersecurity, Linux Administration, Databases, Computer Hardware, Relational Databases, File Systems, User Accounts
Macquarie University
Skills you'll gain: Excel Formulas, Microsoft Excel, Excel Macros, Data Validation, Spreadsheet Software, Data Modeling, Financial Modeling, Workflow Management, Data Integrity, Automation, Data Security
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Continuous Monitoring, Business Continuity, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Application Security, Incident Management, Security Engineering, Data Security, Network Security, User Provisioning, OSI Models, Data Loss Prevention
University of Alberta
Skills you'll gain: Requirements Analysis, Agile Software Development, Agile Methodology, Kanban Principles, Requirements Elicitation, Sprint Retrospectives, Requirements Management, Functional Requirement, Business Requirements, Sprint Planning, Software Development Methodologies, Project Risk Management, Software Development Life Cycle, Scrum (Software Development), Software Technical Review, Software Development, Product Management, Agile Project Management, User Story, Backlogs
In summary, here are 10 of our most popular cyber security policies courses
- Microeconomics Principles:Â University of Illinois Urbana-Champaign
- AWS Cloud Technology Consultant:Â Amazon Web Services
- Global Diplomacy – Diplomacy in the Modern World: University of London
- CompTIA Security+ 701:Â Infosec
- Blockchain Basics:Â University at Buffalo
- Cryptography I:Â Stanford University
- Responsive Website Development and Design:Â University of London
- Moral Foundations of Politics :Â Yale University
- Tools of the Trade: Linux and SQL:Â Google
- Excel Skills for Business: Intermediate II:Â Macquarie University