Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber security policies"
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Encryption, Application Security, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Vulnerability Management, Personally Identifiable Information, Web Applications, SQL
University of Illinois Urbana-Champaign
Skills you'll gain: Distributed Computing, Cloud Infrastructure, Cloud Services, Big Data, Apache Spark, Cloud Computing, Cloud Storage, Cloud Platforms, Network Architecture, Computer Networking, File Systems, Apache Hadoop, Network Infrastructure, Cloud Applications, Infrastructure As A Service (IaaS), Software-Defined Networking, Containerization, Data Storage, NoSQL, Operating Systems
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Threat Detection, Operating Systems, Malware Protection, Application Security, Information Systems Security, Vulnerability Assessments, Vulnerability Management, Computer Architecture
Skills you'll gain: Application Deployment, Cloud Infrastructure, CI/CD, Cloud Security, Service Level Agreement, Microservices, Service Level, Google Cloud Platform, Network Architecture, API Design, Site Reliability Engineering, Cloud Computing Architecture, Kubernetes, Restful API, Infrastructure Architecture, Cloud Storage, Cloud Applications, Key Performance Indicators (KPIs), DevOps, Data Storage
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Malware Protection, Vulnerability Assessments, Operating Systems, OS Process Management
Skills you'll gain: Authentications, Secure Coding, Cryptography, Application Security, Web Applications, Javascript, Identity and Access Management, Cybersecurity, Node.JS, Front-End Web Development
IE Business School
Skills you'll gain: Financial Policy, Public Policies, Economics, Economics, Policy, and Social Studies, Policy Development, Tax, International Finance, Policy Analysis, Financial Regulation, Fiscal Management, Financial Systems, Supply And Demand, Financial Market
University of Colorado System
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Controls, Threat Detection, Linux Administration, Linux
Skills you'll gain: Virtualization, IBM Cloud, Virtual Machines, Infrastructure Architecture, IT Infrastructure, Computer Architecture, Data Centers, Computer Systems, Information Systems Security, Computer Hardware, Cryptography, Transaction Processing
The Hong Kong University of Science and Technology
Skills you'll gain: FinTech, Financial Regulation, Business Continuity Planning, Compliance Management, Disaster Recovery, Financial Regulations, Operational Risk, Bank Regulations, Financial Services, Security Management, Risk Management, Business Risk Management, Financial Industry Regulatory Authorities, Information Technology, Market Trend, Banking Services, Financial Systems, Emerging Technologies, Workforce Development, Banking
University of Pennsylvania
Skills you'll gain: Generative AI, Data Ethics, HR Tech, Data Governance, Big Data, Machine Learning, Data Security, Governance, Business Strategy, Human Resources, Organizational Strategy, Credit Risk, Business Transformation, Risk Management, Tensorflow, Personalized Service, Digital Transformation, Data-Driven Decision-Making, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
In summary, here are 10 of our most popular cyber security policies courses
- Identifying Security Vulnerabilities:Â University of California, Davis
- Cloud Computing:Â University of Illinois Urbana-Champaign
- Advanced Cybersecurity Topics:Â Johns Hopkins University
- Reliable Google Cloud Infrastructure: Design and Process:Â Google Cloud
- Technical Deep Dive with Incident Response Tools:Â Infosec
- JavaScript Security Refreshers:Â Infosec
- Understanding economic policymaking:Â IE Business School
- Secure Networked System with Firewall and IDS:Â University of Colorado System
- Introduction to Enterprise Computing:Â IBM
- FinTech: Finance Industry Transformation and Regulation:Â The Hong Kong University of Science and Technology