Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security policies"
University of Pittsburgh
Skills you'll gain: Law, Regulation, and Compliance, Court Systems, Legal Research, Compliance Management, Human Resource Policies, Arbitration, Regulatory Requirements, Legal Proceedings, Health Care Procedure and Regulation, Business Ethics, Disabilities, Mediation
- Status: Free Trial
Skills you'll gain: Computer Security Incident Management, Incident Management, Incident Response, Security Management, Threat Management, Security Strategy, Event Monitoring, Security Information and Event Management (SIEM), Continuous Monitoring, Enterprise Security, Cyber Operations, Information Technology Operations, Automation, Systems Integration
- Status: Free Trial
Imperial College London
Skills you'll gain: Health Policy, Health Systems, Health Assessment, Health Equity, Public Health, Health Disparities, Policy Analysis, Health Care Administration, Healthcare Industry Knowledge, Public Policies, Program Evaluation, Research, Research Methodologies
- Status: Free Trial
Skills you'll gain: Identity and Access Management, Cloud Infrastructure, Google Cloud Platform, Infrastructure As A Service (IaaS), Microservices, Cloud Computing Architecture, Load Balancing, Cloud Applications, Kubernetes, Prompt Engineering, Cloud Computing, Terraform, CI/CD, User Provisioning, Network Infrastructure, Virtual Machines, Application Deployment, Infrastructure as Code (IaC), Cloud Storage, Distributed Denial-Of-Service (DDoS) Attacks
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Network Monitoring
- Status: NewStatus: Free Trial
Microsoft
Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Microsoft Copilot, Data Security, Back-End Web Development, Authorization (Computing), Application Security, JSON, Identity and Access Management, Data Storage, .NET Framework, Application Programming Interface (API), Encryption
Coursera Project Network
Skills you'll gain: Linux Commands, Linux, Unix Commands, Command-Line Interface, File Management, System Configuration, Linux Administration, Package and Software Management
Johns Hopkins University
Skills you'll gain: Infection Control, Emergency Response, Nursing Homes, Public Health and Disease Prevention, Safety and Security, Community Health, Geriatrics, Mental Health, Risk Management, Education and Training, Interpersonal Communications
Indian Institute for Human Settlements
Skills you'll gain: Social Justice, Community Organizing, Public Policies, Community Development, Policy Analysis, Socioeconomics, Advocacy, Economics, International Relations
- Status: Free Trial
Skills you'll gain: Embedded Software, System Programming, Software Development Tools, Embedded Systems, Software Development, Development Environment, Debugging, Program Development, Build Tools, Application Security, C (Programming Language), Application Development, Computer Architecture, C++ (Programming Language), System Configuration, Hardware Architecture
- Status: Free Trial
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Firewall, Application Security, Web Applications, Network Security, Wireless Networks, Command-Line Interface, Microsoft Windows, SQL
- Status: Free Trial
Association of International Certified Professional Accountants
Skills you'll gain: Key Management, Blockchain, Digital Assets, FinTech, Emerging Technologies, Payment Systems, Security Management, Cryptography, Encryption, Distributed Computing, Data Storage Technologies, Transaction Processing, Ledgers (Accounting)
In summary, here are 10 of our most popular cyber security policies courses
- Law You Can Use:Â University of Pittsburgh
- SOAR for Enterprise Security:Â Codio
- Health Systems Development: Health systems, Policy and Research:Â Imperial College London
- Architecting with Google Compute Engine en Français: Google Cloud
- In the Trenches: Security Operations Center :Â EC-Council
- Security and Authentication:Â Microsoft
- Getting Started with Linux Terminal:Â Coursera Project Network
- Strategies for Senior Housing Communities during COVID-19:Â Johns Hopkins University
- Housing Justice: A View from Indian Cities:Â Indian Institute for Human Settlements
- Cortex-M Software Development Fundamentals:Â Arm