Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber security policies"
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Risk Mitigation, Risk Modeling, Vulnerability Assessments, Security Controls
- Status: Free
Skills you'll gain: Embedded Software, Unified Modeling Language, Systems Development Life Cycle, Embedded Systems, Internet Of Things, Software Development Life Cycle, Systems Architecture, Software Architecture, System Design and Implementation, Technical Design, Systems Engineering, Software Systems, System Requirements, Computer Architecture, Requirements Analysis
- Status: Free
National Taiwan University
Skills you'll gain: Economics, Supply And Demand, Market Dynamics, Socioeconomics, Financial Market, Tax, Market Analysis, Public Policies, Policy Analysis, Decision Making
- Status: Free
The University of Hong Kong
Skills you'll gain: Infectious Diseases, Epidemiology, Biostatistics, Mitigation, Emergency Response, Public Safety and National Security, Health Care, Medical Science and Research, Research, Preventative Care, Health Systems, Risk Management, Risk Analysis, Media and Communications, Community Outreach, Investigation, Big Data, Cultural Sensitivity
Skills you'll gain: IT Security Architecture, Package and Software Management, IT Infrastructure, Network Troubleshooting, Systems Administration, Computer Networking, Infrastructure Security, Encryption, Data Security, Desktop Support, Network Security, Routing Protocols, TCP/IP, Lightweight Directory Access Protocols, Microsoft Windows, Technical Support, Active Directory, Software Installation, Computer Hardware, End User Training and Support
Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Cyber Threat Hunting, Penetration Testing, Anomaly Detection, Scripting, Command-Line Interface, Python Programming, Data Access, System Monitoring, User Accounts, Scripting Languages, System Programming, Automation
Skills you'll gain: Solution Design, Project Management, Technology Solutions, Project Implementation, Project Closure, Stakeholder Management, Technical Consulting, Requirements Analysis, Customer Engagement, Test Planning, Benchmarking, Product Roadmaps, SAP Applications, Project Documentation, Gap Analysis, Needs Assessment, Business Requirements
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Zero Trust Network Access, Application Deployment, Network Protocols, Identity and Access Management, Software Installation, Infrastructure Architecture, Solution Architecture, Linux
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Quality, Data Security, Technical Communication, Automation, Requirements Analysis, Machine Learning
Skills you'll gain: Unified Modeling Language, Systems Engineering, Software Systems, Systems Architecture, Systems Analysis, System Design and Implementation, Systems Integration, Interoperability, Solution Architecture, Requirements Analysis, Verification And Validation, Hardware Architecture
Johns Hopkins University
Skills you'll gain: DevOps, DevSecOps, CI/CD, GitHub, Continuous Deployment, Continuous Integration, Version Control, Git (Version Control System), Process Improvement, Software Development, Digital Transformation, Business Transformation, Cross-Functional Collaboration, Continuous Improvement Process, Scrum (Software Development), Agile Methodology, Automation, Web Development
Infosec
Skills you'll gain: Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Application Security, Security Testing, Authorization (Computing), Authentications, Data Validation, Encryption, Security Controls, Data Security, Vulnerability Scanning, Role-Based Access Control (RBAC), Verification And Validation, Intrusion Detection and Prevention, Security Awareness, Web Servers, Continuous Monitoring, User Accounts, Web Applications, Configuration Management
In summary, here are 10 of our most popular cyber security policies courses
- Introduction to Risk Management:Â University of California, Irvine
- Introduction to Architecting Smart IoT Devices:Â EIT Digital
- 經濟å¸æ¦‚è«–ï¼šèª˜å› èˆ‡å¸‚å ´ï¼ˆIntroduction to Economics: Incentive and Markets): National Taiwan University
- Epidemics:Â The University of Hong Kong
- IT-поддержка Google: Google
- Advanced Python Scripting for Cybersecurity:Â Infosec
- SAP Technology Consultant Hands-on Project:Â SAP
- Check Point Jump Start: Harmony Endpoint Security:Â Check Point Software Technologies Ltd.
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Introduction to Model-Based Systems Engineering:Â Siemens