Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber security policies"
University of London
Skills you'll gain: Network Security, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Encryption
University of Toronto
Skills you'll gain: Human Centered Design, User Experience Design, Organizational Change, User Research, Design Thinking, Change Management, Design Research, Data Ethics, Data Collection, Quantitative Research, Influencing, Qualitative Research, Organizational Leadership, Business Leadership, Storytelling, Leadership, Diversity Awareness, Diversity and Inclusion, Gap Analysis, Innovation
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
Skills you'll gain: Kubernetes, Cloud-Native Computing, Google Cloud Platform, Application Deployment, Scalability, Load Balancing, Cloud Infrastructure, Containerization, Cloud Computing, YAML, Data Storage, Authorization (Computing), General Networking, Network Security
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Encryption, Application Security, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Vulnerability Management, Personally Identifiable Information, Web Applications, SQL
Skills you'll gain: Incident Response, Vulnerability Scanning, Threat Modeling, Identity and Access Management, Vulnerability Management, Threat Detection, Vulnerability Assessments, Secure Coding, Encryption, Security Testing, Cybersecurity, Threat Management, Cyber Governance, Computer Security Incident Management, Cyber Security Policies, Cyber Threat Intelligence, Cyber Security Assessment, Incident Management, Intrusion Detection and Prevention, Technical Communication
The Hong Kong University of Science and Technology
Skills you'll gain: Software Design Patterns, Requirements Analysis, Systems Development Life Cycle, Software Architecture, Acceptance Testing, Software Development Methodologies, Unified Modeling Language, Software Development Life Cycle, Configuration Management, Software Quality Assurance, Debugging, Engineering Software, Software Design, Process Driven Development, Software Engineering, Software Testing, Object Oriented Design, Functional Requirement, Data Modeling, Systems Design
University of Michigan
Skills you'll gain: Django (Web Framework), Object-Relational Mapping, Model View Controller, SQL, Databases, Object Oriented Programming (OOP), Web Applications, Data Modeling, Application Security, Web Development, Python Programming, HTML and CSS
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Cloud Security, Microsoft Azure, Cloud Infrastructure, Cloud Computing, Infrastructure Security, Cloud Platforms, Network Security, Private Cloud, Threat Detection, Public Cloud, Firewall, Security Management
- Status: Free
Campus BBVA
Skills you'll gain: Incident Management, Crisis Management, Security Information and Event Management (SIEM), Data Security, Cybersecurity, Cyber Attacks, Security Strategy, Information Systems Security, Cyber Operations, Information Assurance, Data Processing, Security Awareness, Network Security, Anomaly Detection, Data Science, Time Series Analysis and Forecasting, Unsupervised Learning
University of California, Davis
Skills you'll gain: Data Storytelling, Data Presentation, Key Performance Indicators (KPIs), Dashboard, Interactive Data Visualization, Tableau Software, Data Visualization Software, Data Visualization, Data-Driven Decision-Making, Storytelling, Performance Metric, Performance Measurement, Performance Analysis, Business Metrics, Statistical Reporting, Customer Analysis, Requirements Analysis, Presentations, Public Speaking
- Status: Free
Utrecht University
Skills you'll gain: Social Justice, Human Services, Political Sciences, Law, Regulation, and Compliance, Diversity Awareness, Social Sciences, Public Policies, Economics, Policy, and Social Studies, International Relations, Media and Communications, Governance, Policy Analysis
In summary, here are 10 of our most popular cyber security policies courses
- Introduction to Network Security:Â University of London
- Gender Analytics: Gender Equity through Inclusive Design:Â University of Toronto
- Secure Coding Practices:Â University of California, Davis
- Architecting with Google Kubernetes Engine: Workloads:Â Google Cloud
- Identifying Security Vulnerabilities:Â University of California, Davis
- CompTIA CySA+ (CS0-003):Â Packt
- Software Engineering:Â The Hong Kong University of Science and Technology
- Building Web Applications in Django:Â University of Michigan
- Check Point Jump Start: Cloud Security :Â Check Point Software Technologies Ltd.
- Data & Cybersecurity:Â Campus BBVA