Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber security policies"
University at Buffalo
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Network Protocols, FinTech, Virtual Environment, Data Integrity, Emerging Technologies, Data Security, Data Validation, User Accounts
- Status: Free
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Mathematical Software, Algorithms
University of London
Skills you'll gain: Responsive Web Design, HTML and CSS, Web Design, Human Computer Interaction, Interaction Design, jQuery, Web Design and Development, Bootstrap (Front-End Framework), Hypertext Markup Language (HTML), User Experience Design, User Accounts, MongoDB, Web Applications, Interactive Data Visualization, JavaScript Frameworks, Technical Communication, Web Development Tools, Command-Line Interface, User Interface (UI), Prototyping
- Status: Free
Yale University
Skills you'll gain: Political Sciences, Policy Analysis, Social Justice, Public Policies, Social Sciences, Law, Regulation, and Compliance, Governance, Ethical Standards And Conduct, Socioeconomics, Economics
FAIR Institute
Skills you'll gain: Cyber Risk, Risk Appetite, Cyber Governance, Risk Management, Regulatory Compliance, Risk Analysis, Enterprise Risk Management (ERM), Operational Risk, Cyber Security Strategy, Insurance, Compliance Management, Business Communication, Technical Communication, Strategic Communication, Business Reporting, Governance
Skills you'll gain: Bash (Scripting Language), Linux Commands, Command-Line Interface, Operating Systems, SQL, Linux, Cybersecurity, Linux Administration, Databases, Computer Hardware, Relational Databases, File Systems, User Accounts
Macquarie University
Skills you'll gain: Excel Formulas, Microsoft Excel, Excel Macros, Data Validation, Spreadsheet Software, Data Modeling, Financial Modeling, Workflow Management, Data Integrity, Automation, Data Security
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Continuous Monitoring, Business Continuity, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Application Security, Incident Management, Security Engineering, Data Security, Network Security, User Provisioning, OSI Models, Data Loss Prevention
University of Alberta
Skills you'll gain: Requirements Analysis, Agile Software Development, Agile Methodology, Kanban Principles, Requirements Elicitation, Sprint Retrospectives, Requirements Management, Functional Requirement, Business Requirements, Sprint Planning, Software Development Methodologies, Project Risk Management, Software Development Life Cycle, Scrum (Software Development), Software Technical Review, Software Development, Product Management, Agile Project Management, User Story, Backlogs
Skills you'll gain: Azure Active Directory, Data Security, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Cloud Security, Active Directory, Threat Modeling, Security Strategy, Authentications, Data Storage, Application Security, Database Architecture and Administration, Virtual Machines, Infrastructure Security, Kubernetes, Continuous Monitoring, Web Applications, System Monitoring, Network Security
- Status: Free
EIT Digital
Skills you'll gain: Email Security, Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Identity and Access Management, Threat Detection, User Accounts, Information Privacy, Entrepreneurship
Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, Infrastructure as Code (IaC), Cyber Security Policies, Security Controls, Security Strategy, Identity and Access Management, Threat Detection
In summary, here are 10 of our most popular cyber security policies courses
- Blockchain Basics:Â University at Buffalo
- Cryptography I:Â Stanford University
- Responsive Website Development and Design:Â University of London
- Moral Foundations of Politics :Â Yale University
- Executive Communication and Governance:Â FAIR Institute
- Tools of the Trade: Linux and SQL:Â Google
- Excel Skills for Business: Intermediate II:Â Macquarie University
- CISSP Certified Information Systems Security Professional:Â Packt
- Software Product Management:Â University of Alberta
- Microsoft Azure Security Engineer Associate (AZ-500):Â Microsoft