Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber security policies"
Skills you'll gain: Performance Tuning, Microarchitecture, Embedded Systems, Application Security, System Programming, System Configuration, Computer Architecture, Hardware Architecture, Cybersecurity
Royal Holloway, University of London
Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Risk, Threat Modeling, Security Awareness, Social Sciences, Culture, Psychology, Survey Creation
- Status: Free
Sciences Po
Skills you'll gain: Socioeconomics, Social Sciences, Environmental Issue, Sociology, Cultural Diversity, Demography, Economics, Public Policies, Education and Training, Governance
University of Colorado Boulder
Skills you'll gain: Medical Science and Research, Pharmacy, Health Care, Health Assessment, Behavioral Health, Clinical Research, Epidemiology, Psychiatry, Mental and Behavioral Health Specialties, Patient Treatment, Public Policies, Risk Management, Psychology
Coursera Project Network
Skills you'll gain: Dynamic Host Configuration Protocol (DHCP), Virtual Local Area Network (VLAN), Network Administration, System Configuration, TCP/IP, Computer Networking, General Networking, Virtual Environment, Network Switches, Network Routers, Networking Hardware, Network Engineering, Simulations, Configuration Management, Verification And Validation
LearnKartS
Skills you'll gain: Apache Kafka, Real Time Data, System Monitoring, Performance Tuning, Data Pipelines, Apache Spark, Big Data, Infrastructure Architecture, Systems Architecture, Data Processing, Data Architecture, Security Controls, Data Security, Distributed Computing, Scala Programming, Restful API, Configuration Management, Scalability, System Configuration, JSON
University of Toronto
Skills you'll gain: Organizational Change, Influencing, Organizational Leadership, Business Leadership, Leadership, Diversity and Inclusion, Change Management, Team Management, Business Transformation, Advocacy, Innovation, Cultural Diversity, Stakeholder Management
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Application Security, Vulnerability Assessments, Vulnerability Management, Event Monitoring, Security Controls, Data Integrity, Patch Management, Network Security
Microsoft
Skills you'll gain: Data Security, Cloud Security, Azure Active Directory, Microsoft Azure, Data Storage, Encryption, Cloud Storage, Personally Identifiable Information, Authorization (Computing), Data Access, Authentications, Database Management, Data Governance, Key Management, Role-Based Access Control (RBAC), Firewall
Skills you'll gain: Application Security, Security Testing, Software Testing, Cyber Security Assessment, Cryptography, Penetration Testing, Encryption, Authentications, Identity and Access Management, Business Logic, Test Case, Vulnerability Assessments, Web Servers, Data Validation, Network Protocols
Kennesaw State University
Skills you'll gain: Cost Benefit Analysis, Risk Management Framework, Risk Management, Risk Analysis, ISO/IEC 27001, Enterprise Risk Management (ERM), NIST 800-53, Business Risk Management, Risk Mitigation, Governance Risk Management and Compliance, Cybersecurity, Technical Standard, Continuous Monitoring, Security Controls
Imperial College London
Skills you'll gain: Sanitation, Infection Control, Infectious Diseases, Environment Health And Safety, Epidemiology, Preventative Care, Emergency Response, Water Resources, Health And Safety Standards, Health Care, Public Safety and National Security, Pollution Prevention, Medical Science and Research, Environmental Issue, Environmental Monitoring, Ethical Standards And Conduct
In summary, here are 10 of our most popular cyber security policies courses
- Advanced Armv8-M Features:Â Arm
- Cybercrime:Â Royal Holloway, University of London
- A la recherche du Grand Paris:Â Sciences Po
- Cannabis, Chronic Pain, and Related Disorders:Â University of Colorado Boulder
- Configure and Test Basic Network Connectivity:Â Coursera Project Network
- Apache Kafka:Â LearnKartS
- Transformational Leadership for Inclusive Innovation:Â University of Toronto
- OWASP Top 10 - Risks 6-10:Â Infosec
- Secure Your Data at Rest:Â Microsoft
- Software Security Testing:Â Packt