Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber security policies"
Skills you'll gain: Technical Support, Hardware Troubleshooting, Cloud Computing, Desktop Support, Cloud Services, Cybersecurity, Help Desk Support, End User Training and Support, Network Troubleshooting, Network Administration, Computer Hardware, Data Storage, Issue Tracking, Operating Systems
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Law, Regulation, and Compliance, Regulation and Legal Compliance, Emerging Technologies, Cyber Governance, Market Dynamics, Financial Regulations, E-Commerce, Political Sciences, Automation, Digital Transformation, Technology Solutions, Economics, Policy, and Social Studies, Public Administration, Data Governance, Governance, Economics, Big Data, Algorithms, Artificial Intelligence, Decision Making
University of Minnesota
Skills you'll gain: Gherkin (Scripting Language), Software Testing, Testability, Test Case, Behavior-Driven Development, Code Coverage, Acceptance Testing, Unit Testing, Functional Testing, Test Automation, Test Driven Development (TDD), Requirements Analysis, Functional Requirement
Institute for the Future
Skills you'll gain: Forecasting, Systems Thinking, Strategic Thinking, Brainstorming, Game Theory, Creative Thinking, Collaboration, Interviewing Skills, Innovation, Ethical Standards And Conduct, Empathy, Business Ethics, Communication
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Command-Line Interface, Firewall, System Configuration, Security Management, Network Security, Virtual Machines, Virtualization
Skills you'll gain: International Relations, Social Sciences, Environmental Issue, Governance, Sociology, Demography, Socioeconomics, Cultural Diversity, Policy Analysis, Public Policies, Economics
Universidad de los Andes
Skills you'll gain: Social Justice, Political Sciences, Economics, Policy, and Social Studies, Community Organizing, Advocacy, Public Policies, Human Services, Governance, Cultural Diversity, International Relations
Skills you'll gain: Cloud Infrastructure, Cloud Applications, Identity and Access Management, Google Cloud Platform, Application Deployment, Google App Engine, Infrastructure As A Service (IaaS), Microservices, Terraform, Kubernetes, Cloud Security, CI/CD, Cloud Computing, Load Balancing, Cloud Computing Architecture, Network Architecture, Data Storage, Infrastructure as Code (IaC), Service Level Agreement, Cloud Storage
Infosec
Skills you'll gain: Risk Management Framework, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cyber Risk, Security Management, Continuous Monitoring, Law, Regulation, and Compliance, Cyber Security Policies, Security Controls, Authorization (Computing)
Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Microsoft Azure, System Monitoring, Identity and Access Management, Cloud Security, Enterprise Security, Data Governance, Authorization (Computing), User Provisioning, Multi-Factor Authentication, Authentications
Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Security Strategy, Cyber Security Assessment, Security Controls, Incident Response, Data Storage, Vulnerability Assessments, Patch Management
The University of Sydney
Skills you'll gain: Health Care, Health Information Management and Medical Records, Health Systems, Data Quality, Clinical Data Management, Electronic Medical Record, Digital Communications, Data Governance, Healthcare Industry Knowledge, Analytics, Data Analysis, Data Integrity, Digital Transformation, Data-Driven Decision-Making, Emerging Technologies
In summary, here are 10 of our most popular cyber security policies courses
- Technical Support (IT) Case Studies and Capstone:Â IBM
- Digital Governance:Â Erasmus University Rotterdam
- Black-box and White-box Testing:Â University of Minnesota
- Collaborative Foresight: How to Game the Future:Â Institute for the Future
- Check Point Jump Start: Maestro Hyperscale Network Security:Â Check Point Software Technologies Ltd.
- Migrations internationales : un enjeu mondial:Â Sciences Po
- DDHH y democracia: una visión desde América Latina: Universidad de los Andes
- Architecting with Google Compute Engine en Español: Google Cloud
- NIST DoD RMF:Â Infosec
- Identity Protection and Governance : Microsoft