Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber security policies"
- Status: Free
University of Rochester
Skills you'll gain: Market Dynamics, Supply And Demand, Economics, Business Economics, Policty Analysis, Research, and Development, Price Negotiation, Public Policies, Market Analysis, Competitive Analysis, Consumer Behaviour, Cost Benefit Analysis, Game Theory, Labor Relations
Queen Mary University of London
Skills you'll gain: Cloud Services, Cloud Computing, Cloud Computing Architecture, Contract Negotiation, Cloud Security, Vendor Contracts, Cyber Risk, Infrastructure As A Service (IaaS), Contract Review, Law, Regulation, and Compliance, Contract Management, Regulation and Legal Compliance, Service Level Agreement, Data Security, Data Governance
Google Cloud
Skills you'll gain: Change Management, Data Migration, Organizational Change, Google Workspace, Application Deployment, User Provisioning, Cloud Computing, Calendar Management, Email Security, Stakeholder Management
Splunk Inc.
Skills you'll gain: Splunk, Data Visualization Software, Dashboard, Security Information and Event Management (SIEM), Ad Hoc Reporting, Data Processing, Query Languages, Incident Response
Skills you'll gain: Network Security, OSI Models, Remote Access Systems, Network Performance Management, TCP/IP, Cloud Security, Network Architecture, General Networking, Encryption, Infrastructure Security, Network Protocols, Network Infrastructure, Virtual Local Area Network (VLAN), Wireless Networks, Virtual Private Networks (VPN), Endpoint Security
Johns Hopkins University
Skills you'll gain: Food and Beverage, Health Systems, Social Justice, Community Development, Systems Thinking, Environment, Public Policies, Environmental Policy, Economics
- Status: Free
Johns Hopkins University
Skills you'll gain: Epidemiology, Infectious Diseases, Neonatal Intensive Care Unit, Health Care, Sanitation, Emergency Response, Triage, Public Safety and National Security, Mental Health, Survey Creation, Pediatrics, Ethical Standards And Conduct, Data Collection, Cultural Sensitivity
Skills you'll gain: MITRE ATT&CK Framework, Network Security, Cybersecurity, Cyber Operations, Python Programming, Data Access, Authorization (Computing), Authentications, Scripting, Scripting Languages, Computer Programming, User Accounts
EIT Digital
Skills you'll gain: Personally Identifiable Information, Information Privacy, Law, Regulation, and Compliance, International Relations, Cultural Sensitivity, Data Security, Social Studies, Cybersecurity, Research, Political Sciences
ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Data Security, Cybersecurity, Authentications, Network Security, Data Integrity, Algorithms
- Status: Free
Universidade Estadual de Campinas
Skills you'll gain: Labor Law, Labor Relations, Economics, Socioeconomics, Economic Development, Social Sciences, Employee Relations, Human Resource Policies, Public Policies, Policty Analysis, Research, and Development, Market Dynamics
Skills you'll gain: Blockchain, Digital Assets, Transportation, Supply Chain, and Logistics, Plan Execution, Supply Chain, Governance, Supply Chain Management, Business Transformation, FinTech, Supply Chain Systems, Business Analysis, Market Opportunities, Competitive Analysis, Interoperability, Business Leadership, Strategic Partnership, Operational Analysis, Emerging Technologies, Logistics, E-Commerce
In summary, here are 10 of our most popular cyber security policies courses
- The Power of Markets III: Input Markets and Promoting Efficiency:Â University of Rochester
- Cloud Computing Law: Transactions:Â Queen Mary University of London
- Planning for a Google Workspace Deployment:Â Google Cloud
- Splunk Search Expert 101:Â Splunk Inc.
- Communication and Network Security:Â Packt
- An Introduction to the U.S. Food System: Perspectives from Public Health:Â Johns Hopkins University
- Public Health in Humanitarian Crises 2:Â Johns Hopkins University
- Credential Access, discovery, lateral movement & collection:Â Infosec
- Privacy in the Western World:Â EIT Digital
- Cryptography :Â ISC2