Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "manage security policies"
Skills you'll gain: Package and Software Management, File Systems, Microsoft Windows, Desktop Support, Linux, Operating Systems, OS Process Management, Linux Administration, Remote Access Systems, System Monitoring, Command-Line Interface, User Accounts, Systems Administration, Windows PowerShell, Technical Support and Services, File Management, Linux Commands, Software Installation, Identity and Access Management, Authorization (Computing)
Skills you'll gain: Agile Software Development, Cloud Computing Architecture, Cloud Services, Agile Methodology, DevOps, Kanban Principles, Cloud Security, Cloud Infrastructure, Cloud Platforms, Cloud Computing, Agile Project Management, Cloud-Native Computing, User Story, Cloud Storage, Sprint Retrospectives, Sprint Planning, Workflow Management, CI/CD, Test Driven Development (TDD), Scrum (Software Development)
University of California, Irvine
Skills you'll gain: Cost Estimation, Stakeholder Management, Project Risk Management, Project Schedules, Work Breakdown Structure, Project Performance, Estimation, Conflict Management, Risk Analysis, Quality Management, Project Management, Timelines, Milestones (Project Management), Stakeholder Communications, Cost Management, Project Planning, Peer Review, Budgeting, Scope Management, Change Management
- Status: Free
Skills you'll gain: Cloud Computing Architecture, Cloud Security, Cloud Infrastructure, Cloud Computing, Cloud Applications, IT Security Architecture, Cloud Services, Infrastructure Security, Application Security, Data Security, Cybersecurity, Security Controls, Risk Management Framework, Encryption
Skills you'll gain: Project Scoping, Project Documentation, Project Management Life Cycle, Project Management, Goal Setting, Project Management Software, Stakeholder Management, Cost Benefit Analysis, Resource Allocation, Accountability
Skills you'll gain: Systems Administration, Cloud Infrastructure, IT Infrastructure, Lightweight Directory Access Protocols, Active Directory, Disaster Recovery, Server Administration, Linux Administration, Cloud Computing, Servers, Network Administration, Windows Servers, Data Storage, Virtualization, User Accounts
Skills you'll gain: Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix Shell, Query Languages, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
- Status: Free
Universiteit Leiden
Skills you'll gain: Risk Management, Safety and Security, Threat Management, Crisis Management, Cybersecurity, Analysis, Security Awareness, Complex Problem Solving, International Relations, Policy Analysis, Governance
Skills you'll gain: Quality Management, Project Closure, Project Management, Continuous Improvement Process, Project Controls, Quality Monitoring, Team Management, Project Risk Management, Data-Driven Decision-Making, Project Documentation, Stakeholder Communications, Technical Communication, Meeting Facilitation, Communication
University of Michigan
Skills you'll gain: Talent Management, Team Motivation, Team Building, Teamwork, Team Management, Talent Pipelining, Influencing, Team Leadership, Motivational Skills, Employee Onboarding, Employee Performance Management, Employee Coaching, Conflict Management, Employee Engagement, Interviewing Skills, Persuasive Communication, Leadership, Professional Networking, Business Leadership, Leadership Development
Skills you'll gain: Project Management Life Cycle, Project Management, Project Planning, Communication Planning, Project Documentation, Milestones (Project Management), Project Schedules, Risk Management, Cost Management, Budgeting, Estimation, Procurement, Technical Communication, Strategic Communication
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
In summary, here are 10 of our most popular manage security policies courses
- Operating Systems and You: Becoming a Power User:Â Google
- DevOps, Cloud, and Agile Foundations:Â IBM
- Project Management Principles and Practices:Â University of California, Irvine
- Certified Cloud Security Professional (CCSP):Â Infosec
- Project Initiation: Starting a Successful Project:Â Google
- System Administration and IT Infrastructure Services:Â Google
- Tools of the Trade: Linux and SQL:Â Google
- Security & Safety Challenges in a Globalized World:Â Universiteit Leiden
- Project Execution: Running the Project:Â Google
- Leading People and Teams:Â University of Michigan