Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber security policies"
Google Cloud
Skills you'll gain: Kubernetes, Identity and Access Management, Cloud-Native Computing, Google Cloud Platform, CI/CD, Containerization, Application Deployment, Cloud Management, Scalability, Cloud Computing, Cloud Infrastructure, Load Balancing, Continuous Integration, DevOps, Continuous Delivery, YAML, Data Storage, Cloud Applications, Application Performance Management, Authorization (Computing)
- Status: Free
University of Pennsylvania
Skills you'll gain: Political Sciences, Social Studies, Law, Regulation, and Compliance, Criminal Investigation and Forensics, Labor Law, Regulation and Legal Compliance, Public Policies, Governance
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Identity and Access Management, Business Risk Management, Security Controls
- Status: Free
West Virginia University
Skills you'll gain: Auditing, Internal Controls, Financial Controls, Threat Detection, Anomaly Detection, Financial Auditing, Cybersecurity, Investigation, Analytics, Security Awareness, Big Data, Business Ethics, Analysis, Compliance Reporting, Data Analysis, Ethical Standards And Conduct
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Vulnerability Scanning, Encryption, Key Management, Virtual Machines
Skills you'll gain: Extract, Transform, Load, Data Architecture, Data Pipelines, Big Data, Data Warehousing, Data Governance, Data Storage Technologies, Apache Hadoop, Relational Databases, Apache Spark, Data Lakes, Databases, SQL, Data Mart, Data Security
Skills you'll gain: Security Management, Incident Management, Threat Management, Cyber Governance, Risk Management Framework, Security Strategy, Cybersecurity, Cyber Security Policies, Information Assurance, Cyber Security Assessment, Security Controls, Vulnerability Assessments, Cyber Risk, Security Requirements Analysis, Security Awareness, Disaster Recovery
University at Buffalo
Skills you'll gain: Electrical Substation, Basic Electrical Systems, Electrical Safety, Low Voltage, High Voltage, Electrical Engineering, Electronic Components, Power Electronics, Wiring Diagram, Three-Phase, Environmental Issue, Environment, Emerging Technologies, Reliability
Cisco Learning and Certifications
Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Information Systems Security, Cybersecurity, Network Security, Security Information and Event Management (SIEM), Network Monitoring, Information Assurance, Network Analysis, Intrusion Detection and Prevention, Event Monitoring, Data Capture, Data Integrity, Network Troubleshooting, Incident Response
University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Application Security, Cryptography, Data Storage
University of Geneva
Skills you'll gain: Portfolio Management, Wealth Management, Risk Management, Investment Management, Financial Market, Business Risk Management, Capital Markets, Risk Analysis, Market Liquidity, Investments, Asset Management, Performance Measurement, Market Dynamics, Environmental Social And Corporate Governance (ESG), Financial Planning, Derivatives, Finance, Equities, Financial Management, Business Ethics
- Status: Free
Yonsei University
Skills you'll gain: TCP/IP, Network Protocols, Open Shortest Path First (OSPF), Network Routing, Cybersecurity, General Networking, Intrusion Detection and Prevention, File Transfer Protocol (FTP), Dynamic Host Configuration Protocol (DHCP), Firewall, Network Architecture, Network Analysis
In summary, here are 10 of our most popular cyber security policies courses
- Architecting with Google Kubernetes Engine:Â Google Cloud
- An Introduction to American Law:Â University of Pennsylvania
- Tools for Security Specialists:Â Codio
- Forensic Accounting and Fraud Examination:Â West Virginia University
- Security Best Practices in Google Cloud:Â Google Cloud
- Introduction to Data Engineering:Â IBM
- Certified Information Security Manager (CISM):Â Packt
- Electric Power Systems:Â University at Buffalo
- Data Security:Â Cisco Learning and Certifications
- Networking and Security in iOS Applications:Â University of California, Irvine