Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber security policies"
Google
Skills you'll gain: Systems Administration, IT Security Architecture, Remote Access Systems, IT Infrastructure, Hardening, Network Troubleshooting, OSI Models, Computer Networking, Routing Protocols, Desktop Support, Application Security, Security Strategy, Server Administration, Technical Support, Lightweight Directory Access Protocols, Microsoft Windows, File Systems, Computer Hardware, Software Installation, Help Desk Support
Skills you'll gain: Debugging, Cybersecurity, Programming Principles, Python Programming, Scripting, Automation, File Management, Data Structures
Coursera Project Network
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Web Scraping, Web Applications
Juniper Networks
Skills you'll gain: Juniper Network Technologies, Network Security, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Software-Defined Networking, Network Planning And Design, Firewall, Network Troubleshooting, Computer Networking, Virtualization, Network Architecture, Security Software, Network Administration, IT Security Architecture, Remote Access Systems, System Configuration, Network Monitoring, Infrastructure Security, Threat Management, Cybersecurity
University of Michigan
Skills you'll gain: PHP (Scripting Language), Hypertext Markup Language (HTML), MySQL, Web Applications, Web Development, Cascading Style Sheets (CSS), Development Environment, Back-End Web Development, Database Development, Web Servers, Application Security, Software Installation, Data Validation
Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Security Engineering, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Risk Management Framework, Threat Detection, Vulnerability Assessments, Incident Response
University of Minnesota
Skills you'll gain: Cybersecurity, Cyber Attacks, Cloud Computing, Cloud Services, IT Management, Information Technology, Technology Solutions, Technology Strategies, IT Infrastructure, Data Security, Technical Management, Information Systems, Mobile Security, Emerging Technologies, Innovation, Business Transformation, Blockchain
Johns Hopkins University
Skills you'll gain: Electronic Medical Record, Patient Safety, Health Information Management and Medical Records, Security Awareness, Personally Identifiable Information, Encryption, Help Desk Support, Desktop Support, System Support, End User Training and Support, Health Care, Decision Support Systems, Health Care Procedure and Regulation, Computerized Physician Order Entry, Data Security, Technical Support, Cyber Attacks, Medical Records, Healthcare Industry Knowledge, Patient Education and Support
LearnQuest
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Security Strategy, Cloud Security, Disaster Recovery, Threat Management, Firewall, Network Security, Cybersecurity, Cloud Services, Security Information and Event Management (SIEM), Network Monitoring, Security Controls, Cloud Computing Architecture, Infrastructure Security
University of Michigan
Skills you'll gain: Payment Systems, Payment Processing, FinTech, Blockchain, Mobile Banking, Credit/Debit Card Processing, Banking Services, Emerging Technologies, Investment Management, Wealth Management, Asset Management, Investments, Point of Sale, Mobile Security, Banking, Fundraising, Capital Markets, Consumer Lending, Market Dynamics, Digital Assets
LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Penetration Testing, Network Security, Malware Protection, Cybersecurity, Cloud Computing, Mobile Security, Application Security, Cyber Attacks, Cyber Security Assessment, Security Testing, Threat Detection, Information Systems Security, Cyber Threat Intelligence, Intrusion Detection and Prevention, Virtualization, Firewall, Vulnerability Assessments, Threat Modeling
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Linux Commands, TCP/IP, Network Protocols, Scripting, MySQL, Data Structures
In summary, here are 10 of our most popular cyber security policies courses
- Suporte em TI do Google:Â Google
- Automate Cybersecurity Tasks with Python:Â Google
- Web Application Security Testing with OWASP ZAP:Â Coursera Project Network
- Juniper Networks Security Fundamentals:Â Juniper Networks
- Building Web Applications in PHP:Â University of Michigan
- Introduction to Automotive Cybersecurity & Vehicle Networks:Â Starweaver
- IT Infrastructure and Emerging Trends:Â University of Minnesota
- Healthcare IT Support:Â Johns Hopkins University
- Advanced Network Security:Â LearnQuest
- Financial Technology (Fintech) Innovations:Â University of Michigan