Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber security policies"
Skills you'll gain: Network Troubleshooting, Computer Networking, IT Security Architecture, Cloud Management, Linux, IT Infrastructure, Cybersecurity, Microsoft Windows, Network Security, Network Protocols, TCP/IP, Systems Administration, Remote Access Systems, Desktop Support, Technical Support, File Systems, Security Strategy, Lightweight Directory Access Protocols, System Support, Help Desk Support
- Status: Free
University of London
Skills you'll gain: Microsoft Excel, Environmental Policy, Data Analysis, Data Visualization, Descriptive Statistics, Correlation Analysis, Policy Analysis, Environmental Issue, Environmental Monitoring, Scatter Plots, Statistics, Economics
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Scalability, Network Security, Identity and Access Management, Cloud Management, System Monitoring, Network Monitoring, Continuous Monitoring, Containerization, Capacity Management, Application Performance Management, Application Security
Skills you'll gain: IT Security Architecture, IT Infrastructure, Network Security, OSI Models, Systems Administration, Microsoft Windows, Information Systems Security, Package and Software Management, Technical Support, Network Troubleshooting, Computer Networking, Cloud Infrastructure, Operating Systems, TCP/IP, Disaster Recovery, Lightweight Directory Access Protocols, Cybersecurity, Desktop Support, Software Installation, Help Desk Support
Skills you'll gain: Data Governance, Systems Development, Data Loss Prevention, Security Testing, Data Migration, Network Security, Database Management, Incident Management, Software Development Life Cycle, Problem Management, Disaster Recovery, Resource Management, Control Objectives for Information and Related Technology (COBIT), Cryptography, IT Management, Compliance Auditing, Governance, Auditing, Test Planning, Risk Control
Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Information Systems Security, Cybersecurity, Cloud Security, Cyber Attacks, Intrusion Detection and Prevention, Computer Networking, Data Security, Security Controls
University of Colorado System
Skills you'll gain: Database Design, Software Design, Usability Testing, User Interface and User Experience (UI/UX) Design, Databases, Software Architecture, Software Design Patterns, Systems Design, Application Security, Design Strategies, Operating Systems
Rice University
Skills you'll gain: Economics, Supply And Demand, Economic Development, Financial Policy, Market Dynamics, Socioeconomics, Business Economics, Business Metrics, Public Policies, Performance Metric, Fiscal Management, Investments, Labor Relations, Cost Benefit Analysis, Finance, Statistical Analysis
EIT Digital
Skills you'll gain: Cybersecurity, Threat Modeling, Information Systems Security, Security Management, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Security Policies, Threat Management, Cyber Risk, Threat Detection, Cyber Security Assessment, Network Security, Application Security, Risk Management, Security Controls, Security Awareness, Data Security, Information Privacy, Vulnerability Assessments, Business Economics
Google Cloud
Skills you'll gain: Application Performance Management, System Monitoring, Google Cloud Platform, Network Monitoring, Event Monitoring, Performance Tuning, Cloud Management, Identity and Access Management, Cloud Applications, Cloud Computing, Security Information and Event Management (SIEM), Query Languages
SkillUp EdTech
Skills you'll gain: Information Systems Security Assessment Framework (ISSAF), Cyber Security Assessment, Cybersecurity, Incident Response, Network Security
Microsoft
Skills you'll gain: Microsoft Azure, Cloud Security, Data Security, Network Security, Cloud Applications, Authorization (Computing), Role-Based Access Control (RBAC), Application Security, Microsoft SQL Servers, Cloud Development, Azure Active Directory, Data Loss Prevention, Firewall, Relational Databases, Key Management, Identity and Access Management, Threat Detection, Encryption, Virtual Machines
In summary, here are 10 of our most popular cyber security policies courses
- Google شهادة تقنية المعلومات من: Google
- Doing Economics: Measuring Climate Change: University of London
- Securing, Monitoring, and Scaling Kubernetes Clusters : LearnQuest
- Google IT Support (Deutsch): Google
- CISA: Certified Information Systems Auditor: Packt
- Seguridad en la red: Universidad de los Andes
- Software Design as an Abstraction: University of Colorado System
- Principles of Economics: Macroeconomics - The Big Picture: Rice University
- Becoming a Cybersecurity Consultant: EIT Digital
- Logging and Monitoring in Google Cloud: Google Cloud