Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber security policies"
Skills you'll gain: Risk Management, Cyber Risk, Threat Management, Security Management, Business Risk Management, IT Management, Vulnerability Management, Risk Mitigation, Risk Analysis, Enterprise Risk Management (ERM), Operational Risk, Risk Control, Cybersecurity, Threat Modeling, Vulnerability Assessments, Incident Response
Akamai Technologies, Inc.
Skills you'll gain: Routing Protocols, OSI Models, TCP/IP, General Networking, Network Protocols, Network Troubleshooting, Computer Networking, Networking Hardware, Network Security, Network Infrastructure, Network Model, Virtual Private Networks (VPN), Wireless Networks, Network Routers, Dynamic Host Configuration Protocol (DHCP), Intrusion Detection and Prevention, Network Analysis, Security Controls
Skills you'll gain: TCP/IP, Systems Administration, Network Troubleshooting, File Systems, IT Infrastructure, OSI Models, Cybersecurity, Cyber Attacks, Network Security, Network Protocols, Microsoft Windows, Application Security, Operating Systems, Lightweight Directory Access Protocols, Linux, Server Administration, Technical Support, Computer Hardware, Help Desk Support, Computer Networking
Skills you'll gain: Requirements Elicitation, Business Analysis, Backlogs, Requirements Management, Business Systems Analysis, Stakeholder Engagement, Business Process, Business Workflow Analysis, User Requirements Documents, User Story, Business Requirements, Stakeholder Management, Business Modeling, Business Intelligence, Business Risk Management, Business Strategies, Financial Analysis, Performance Measurement, Business Process Modeling, Requirements Analysis
The Hong Kong University of Science and Technology
Skills you'll gain: Requirements Analysis, Unified Modeling Language, Object Oriented Design, Functional Requirement, Data Modeling, Systems Design, Object Oriented Programming (OOP), Systems Development Life Cycle, System Requirements, Software Development, Software Engineering, Software Systems
Duke University
Skills you'll gain: Loans, FinTech, Key Management, Cryptography, Digital Assets, Market Liquidity, Financial Trading, Transaction Processing, Supply Management
Microsoft
Skills you'll gain: Database Management, C# (Programming Language), Microsoft SQL Servers, SQL, ASP.NET, Load Balancing, Relational Databases, Role-Based Access Control (RBAC), Scalability, Object Oriented Programming (OOP), Databases, Authentications, Debugging, Secure Coding, .NET Framework, Performance Tuning, Server Side, Back-End Web Development, Program Development, Algorithms
Infosec
Skills you'll gain: Risk Management Framework, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cyber Risk, Security Management, Continuous Monitoring, Law, Regulation, and Compliance, Cyber Security Policies, Security Controls, Authorization (Computing)
- Status: Free
Johns Hopkins University
Skills you'll gain: Epidemiology, Infectious Diseases, Policy Analysis, Mathematical Modeling, Statistical Modeling, Public Policies, Data Modeling, Predictive Modeling, Risk Analysis, Statistical Analysis, Decision Support Systems, Vulnerability
Skills you'll gain: Hardware Troubleshooting, Network Security, General Networking, Network Administration, Infrastructure Security, Network Troubleshooting, Technical Support, Mobile Security, Desktop Support, System Support, Computer Hardware, Technical Services, Information Technology, Operating Systems, Mac OS, Virtualization and Virtual Machines, Test Planning, Microsoft Windows, Unix, Network Protocols
Skills you'll gain: Governance, Data Ethics, Business Ethics, Strategic Leadership, Business Leadership, Organizational Leadership, Governance Risk Management and Compliance, Ethical Standards And Conduct, Policy Development, Human Resource Policies, Culture Transformation, Stakeholder Engagement, Data Governance, Policy Analysis, Change Management, Employee Engagement
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Patch Management, Amazon CloudWatch, Infrastructure Security, Threat Detection, Amazon S3, Vulnerability Scanning, Data Security, Cloud Security, Network Security, Incident Response, Data Governance, Authorization (Computing), Continuous Monitoring, Cyber Governance, Firewall, Vulnerability Assessments, Role-Based Access Control (RBAC)
In summary, here are 10 of our most popular cyber security policies courses
- Risk Management for Cybersecurity and IT Managers:Â Packt
- Networking Fundamentals:Â Akamai Technologies, Inc.
- IT-підтримка від Google: Google
- Certified Business Analysis Professional™ (CBAP®): Starweaver
- Software Engineering: Modeling Software Systems using UML:Â The Hong Kong University of Science and Technology
- Decentralized Finance (DeFi) Primitives:Â Duke University
- Microsoft Back-End Developer:Â Microsoft
- NIST DoD RMF:Â Infosec
- Infectious Disease Transmission Models for Decision-Makers:Â Johns Hopkins University
- Practice Exams for CompTIA A+ Certification: Core 1 & Core 2:Â IBM