Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber security policies"
Automatic Data Processing, Inc. (ADP)
Skills you'll gain: Payroll, Payroll Processing, Payroll Systems, Payroll Administration, Payroll Tax, Payroll Reporting, Compensation Strategy, Data Entry, Employee Onboarding, Labor Law, Human Resource Strategy, Compensation Management, Compensation and Benefits, Non-Profit Accounting, Tax Preparation, Tax Compliance, Human Resources, Benefits Administration, Specialized Accounting, Record Keeping
- Status: Free
University of Illinois Urbana-Champaign
Skills you'll gain: Infectious Diseases, Epidemiology, Food Safety and Sanitation, Food Quality Assurance And Control, Preventative Care, Health Care, Caregiving, Investigation, Environment and Resource Management, Sustainability Reporting
Imperial College London
Skills you'll gain: Health Assessment, Sanitation, Infection Control, Program Evaluation, Infectious Diseases, Preventative Care, Environment Health And Safety, Behavioral Economics, Policy Analysis, Epidemiology, Analysis, Behavioral Health, Emergency Response, Water Resources, Health And Safety Standards, Health Systems, Public Safety and National Security, Health Care, Social Sciences, Culture
University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, TCP/IP, Network Analysis
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Computer Security, Security Controls, Vulnerability Assessments, Identity and Access Management
Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Security Engineering, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Risk Management Framework, Threat Detection, Vulnerability Assessments, Incident Response
- Status: Free
The University of Sydney
Skills you'll gain: Blockchain, Distributed Computing, Security Engineering, Network Security, Scalability, Cryptography, Data Integrity, Transaction Processing, Algorithms, Network Model, Theoretical Computer Science
Sciences Po
Skills you'll gain: International Relations, Cultural Diversity, Social Sciences, Demography, Environmental Issue, Sociology, Social Justice, Political Sciences, Policty Analysis, Research, and Development, Governance, Law, Regulation, and Compliance, Public Policies, Economics
Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Security Requirements Analysis, Penetration Testing, Information Systems Security, Human Factors (Security), Cybersecurity, Threat Detection, Cloud Security, Vulnerability Assessments, Cyber Attacks, Encryption, Vulnerability Management, Risk Management Framework, Data Security, Security Management, Personally Identifiable Information
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Cybersecurity, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Information Systems Security, Cybersecurity, Encryption, Virtual Private Networks (VPN), Cyber Attacks, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
DeepLearning.AI
Skills you'll gain: Software Documentation, Software Testing, Technical Documentation, Dependency Analysis, Software Development Tools, Debugging, Development Environment, Code Review, Maintainability, Generative AI, Software Engineering, Application Security, Artificial Intelligence
In summary, here are 10 of our most popular cyber security policies courses
- ADP Entry-Level Payroll Specialist:Â Automatic Data Processing, Inc. (ADP)
- Sustainable Food Production Through Livestock Health Management:Â University of Illinois Urbana-Champaign
- Foundations of Public Health Practice:Â Imperial College London
- Introduction to Computer Security:Â University of London
- Advanced Cybersecurity Concepts and Capstone Project:Â Microsoft
- Introduction to Automotive Cybersecurity & Vehicle Networks:Â Starweaver
- Blockchain Scalability and its Foundations in Distributed Systems:Â The University of Sydney
- International migrations: a global issue:Â Sciences Po
- Ciberseguridad:Â Universidad de los Andes
- Hacking and Patching:Â University of Colorado System