Filter by
The language used throughout the course, in both instruction and assessments.
Results for "information security management"
Johns Hopkins University
Skills you'll gain: Data Manipulation, Data Cleansing, Data Integration, Data Import/Export, Data Collection, Data Management, Web Scraping, R Programming, MySQL, Application Programming Interface (API)
University of Illinois Urbana-Champaign
Skills you'll gain: Strategic Leadership, Leadership Development, Team Leadership, Leadership and Management, Team Building, Organizational Strategy, People Development, Strategic Decision-Making, Business Planning, Business Strategy, Leadership, Growth Strategies, Organizational Structure, Change Management, Process Improvement and Optimization, Operational Efficiency, Analysis, Value Propositions
Rutgers the State University of New Jersey
Skills you'll gain: Logistics, Logistics Management, Supply Chain Management, Supply Chain, Manufacturing Operations, Strategic Sourcing, Operations Management, Warehouse Management, Supply Chain Systems, Forecasting, Business Operations, Materials Management, Financial Statements, Inventory Management System, Transportation Management, Procurement, Financial Analysis, Supply Chain Planning, Cash Flows, Business Metrics
Johns Hopkins University
Skills you'll gain: Clinical Trials, Clinical Research, Qualitative Research, Data Synthesis, Research Methodologies, Data Collection, Research Design, Analysis, Quantitative Research, Risk Analysis, Statistical Methods, Statistical Analysis, Data Analysis
Skills you'll gain: Analytics, Business Analytics, Data Analysis, Data-Driven Decision-Making, Business Intelligence, Big Data, Analytical Skills, Analysis, Data Visualization, Data Storytelling, Data Science, Statistical Analysis, Data Visualization Software, Decision Making, Data Collection, R Programming
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Disaster Recovery, Cyber Threat Hunting, Security Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
Skills you'll gain: Power BI, Dashboard, SQL, Microsoft SQL Servers, Data Security, Data Analysis, Data Visualization Software, Data Modeling, Data Management, Data Access, Authorization (Computing)
Skills you'll gain: Plotly, Exploratory Data Analysis, Predictive Modeling, Interactive Data Visualization, Data Science, Data-Driven Decision-Making, Data Storytelling, Data Presentation, Data Analysis, Pandas (Python Package), Web Scraping, Statistical Machine Learning, Data Wrangling, Data Collection
Skills you'll gain: Information Privacy, Data Governance, Personally Identifiable Information, General Data Protection Regulation (GDPR), Data Security, Data Management, Data Architecture, Data Strategy, Data Ethics, Metadata Management
Arizona State University
Skills you'll gain: Meeting Facilitation, Sales Presentations, Brainstorming, Product Planning, Purchasing, Business Writing, Business Communication, Marketing Materials, Business Planning, Negotiation, Selling Techniques, Marketing Communications, Marketing Planning, Active Listening, Business Correspondence, Advertising, Telephone Skills, Promotional Strategies, Presentations, Procurement
LearnKartS
Skills you'll gain: Project Management Office (PMO), Project Management, Stakeholder Management, Project Management Life Cycle, Project Management Institute (PMI) Methodology, Operations Management, Program Management, Governance, Change Management, Portfolio Management, Organizational Structure
In summary, here are 10 of our most popular information security management courses
- Getting and Cleaning Data:Â Johns Hopkins University
- Strategic Leadership and Management Capstone:Â University of Illinois Urbana-Champaign
- Supply Chain Excellence:Â Rutgers the State University of New Jersey
- Introduction to Systematic Review and Meta-Analysis:Â Johns Hopkins University
- Data-driven Decision Making:Â PwC
- Cyber Incident Response:Â Infosec
- Secure Coding Practices:Â University of California, Davis
- Deploy and Maintain Power BI Assets and Capstone project:Â Microsoft
- Applied Data Science Capstone:Â IBM
- IBM Data Privacy for Information Architecture:Â IBM