Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber security policies"
Imperial College London
Skills you'll gain: Health Systems, Health Assessment, Health Care Administration, Health Care, Governance, Healthcare Industry Knowledge, Primary Care, Policy Analysis, Epidemiology, Public Policies, Program Evaluation, Policy Development, Policty Analysis, Research, and Development, Human Services, Economics, Policy, and Social Studies, Research, Economics
University of Pennsylvania
Skills you'll gain: Environmental Social And Corporate Governance (ESG), Governance, Corporate Sustainability, Diversity and Inclusion, Corporate Strategy, Corporate Communications, Business Ethics, Crisis Management, Advocacy, Strategic Communication, Stakeholder Engagement, Risk Management, Executive Recruitment, Strategic Partnership
Emory University
Skills you'll gain: Epidemiology, Emergency Response, Sanitation, Social and Human Services, Health Systems, Water Resources, Infectious Diseases, Public Safety and National Security, Health Administration, Mental Health, Food Safety and Sanitation, Data Collection
Skills you'll gain: Technical Design, User Feedback, Project Design, Technical Consulting, Solution Design, Solution Architecture, SAP Applications, Technical Communication, Requirements Analysis, Business Analysis, System Implementation, Product Roadmaps, Business Requirements, Gap Analysis, Customer Engagement
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Cybersecurity, Cyber Attacks, Threat Modeling, Vulnerability Assessments, Network Security, Scenario Testing, Network Analysis, Problem Management
Queen Mary University of London
Skills you'll gain: General Data Protection Regulation (GDPR), Cloud Services, Cloud Computing, Tax, Tax Laws, Law, Regulation, and Compliance, Cloud Security, Personally Identifiable Information, Cloud Computing Architecture, Tax Compliance, Data Security, Regulation and Legal Compliance, Sales Tax, Information Privacy, Contract Negotiation, Vendor Contracts, Corporate Tax, Cybersecurity, Cyber Risk, Infrastructure As A Service (IaaS)
University of Colorado Boulder
Skills you'll gain: Data Ethics, Data Visualization, Data Visualization Software, Interactive Data Visualization, Visualization (Computer Graphics), Data Security, Data Presentation, Technical Communication, Cybersecurity, Cyber Attacks, Statistical Reporting, Data Storytelling, User Centered Design, Authentications, Data Science, Data Encryption Standard, Ethical Standards And Conduct, User Experience Design, Cryptography, Data Integrity
Johns Hopkins University
Skills you'll gain: Sanitation, Crisis Intervention, Water Resources, Emergency Response, Public Safety and National Security, Health Systems, Environmental Resource Management, Health Care, Infectious Diseases, Food Safety and Sanitation, International Relations, Health Assessment
Coursera Project Network
Skills you'll gain: Virtual Machines, Microsoft Azure, Cloud Infrastructure, Cloud Computing, Network Security, Web Servers, Network Administration, Linux Servers, Remote Access Systems
University of Colorado System
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Advanced Encryption Standard (AES), Cryptographic Protocols, Application Security, Key Management, Public Key Cryptography Standards (PKCS), Secure Coding, Web Development, Email Security, PHP (Scripting Language), Data Integrity
- Status: Free
Yale University
Skills you'll gain: Primary Care, Health Systems, Health Care, Care Coordination, Nursing and Patient Care, Preventative Care, Nursing Practices, Patient Education and Support, Cultural Responsiveness, Advocacy, Public Policies, Diversity Awareness, Policy Development, Social Justice, Education and Training
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Selenium (Software), Software Testing, Security Testing, Test Automation, Performance Testing, Functional Testing, Mobile Development Tools, Test Execution Engine, Test Planning, Application Security, Mobile Development, Performance Tuning, Browser Compatibility, Application Performance Management, Vulnerability Scanning, Continuous Deployment
In summary, here are 10 of our most popular cyber security policies courses
- Health Systems Development:Â Imperial College London
- ESG and Social Activism:Â University of Pennsylvania
- Health in Complex Humanitarian Emergencies:Â Emory University
- Designing an SAP Solution:Â SAP
- CEH (v12) Practice Projects and Exam Simulators:Â LearnKartS
- Cloud Computing Law:Â Queen Mary University of London
- Vital Skills for Data Science:Â University of Colorado Boulder
- Public Health in Humanitarian Crises 1:Â Johns Hopkins University
- Azure: Create a Virtual Machine and Deploy a Web Server:Â Coursera Project Network
- Basic Cryptography and Programming with Crypto API:Â University of Colorado System