Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security policies"
Skills you'll gain: Generative AI, Data Ethics, Anomaly Detection, Advanced Analytics, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Data Security, Applied Machine Learning, Artificial Neural Networks, Email Security, Natural Language Processing
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Security Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Cybersecurity, Application Security, Firewall, Web Applications, Network Security, Wireless Networks, Command-Line Interface, Microsoft Windows, Virtual Machines, SQL
University of Illinois Urbana-Champaign
Skills you'll gain: Cloud Applications, Cloud Computing, Cloud Infrastructure, Technical Services, Distributed Computing, Network Architecture, General Networking, Systems Integration
Google Cloud
Skills you'll gain: Database Architecture and Administration, Oracle Databases, Data Migration, Microsoft SQL Servers, Cloud Storage, Google Cloud Platform, Cloud Computing, Databases, Virtual Private Networks (VPN), Network Security, Test Tools, System Implementation, Virtual Machines
L&T EduTech
Skills you'll gain: Fire And Life Safety, Pump Stations, Schematic Diagrams, Blueprint Reading, Process Flow Diagrams, Safety Training, Hydraulics, Compliance Management, Plumbing, Safety Assurance, Building Services Engineering, Building Design, Engineering Drawings, Structural Engineering, Safety and Security, Architectural Engineering, System Monitoring, Facility Management and Maintenance, HVAC, Water Resources
Skills you'll gain: Splunk, Data Modeling, Role-Based Access Control (RBAC), System Monitoring, Incident Response, User Accounts, Security Information and Event Management (SIEM), Authorization (Computing), Machine Learning, Event Monitoring, Systems Administration, Performance Tuning, Data Visualization, Threat Detection, Identity and Access Management, Exploratory Data Analysis, Anomaly Detection, Continuous Monitoring, Correlation Analysis, Data Analysis
University of Colorado System
Skills you'll gain: Security Requirements Analysis, Requirements Analysis, Risk Management Framework, User Requirements Documents, Scalability, Verification And Validation
- Status: Free
National Taiwan University
Skills you'll gain: Child Welfare, Social Work, Community and Social Work, Advocacy, Social Sciences, Empowerment, Social Justice, Public Policies, Sociology, Human Development, Culture, Systems Thinking
Universitat Autònoma de Barcelona
Skills you'll gain: Language Interpretation, Translation, and Studies, Language Learning, Cultural Diversity, Diversity Awareness, Culture, Creativity, Anthropology, Intercultural Competence, Education and Training, Community Development, Public Policies, Policty Analysis, Research, and Development
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Cyber Attacks, Threat Modeling, Risk Analysis, Application Security, Vulnerability Assessments, Network Security, Threat Detection, Data Security, Artificial Intelligence, Risk Mitigation, Generative AI, Natural Language Processing
University of Maryland, College Park
Skills you'll gain: Law, Regulation, and Compliance, Entrepreneurship, Business, Regulation and Legal Compliance, Labor Law, Business Management, Contract Management, Staff Management, New Business Development, Organizational Structure, Mergers & Acquisitions
Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Security Management, Network Security, Cybersecurity, Incident Management, Intrusion Detection and Prevention, Cyber Threat Hunting, Security Controls, Distributed Denial-Of-Service (DDoS) Attacks, Digital Communications, Data Integrity
In summary, here are 10 of our most popular cyber security policies courses
- Gen AI for Fraud Detection Analytics: Edureka
- Intermediate Ethical Hacking Techniques: Packt
- Cloud Computing Project: University of Illinois Urbana-Champaign
- Enterprise Database Migration: Google Cloud
- Fire and Life Safety Systems: L&T EduTech
- Splunk Administration and Advanced Topics: EDUCBA
- Software Requirements Prioritization: Risk Analysis: University of Colorado System
- 少年福利與權利 (Welfare and Rights of Youth): National Taiwan University
- Linguistic Diversity, What for?: Universitat Autònoma de Barcelona
- Introduction to Prompt Injection Vulnerabilities: Coursera Instructor Network