Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "implementing data security and resource policies"
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Presentation, Data Governance, Data Security, Data Migration, Database Design, Data Visualization, Interactive Data Visualization, Descriptive Statistics, Data Mining, Cloud Storage, Data Visualization Software, Extract, Transform, Load, IBM DB2, Data Management, MySQL, Excel Formulas
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Risk Mitigation, Security Information and Event Management (SIEM), Security Controls, Threat Modeling, Security Strategy, Continuous Monitoring, Data Security, Information Systems Security, Computer Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), Auditing
Skills you'll gain: SQL, Jupyter, Data Mining, Peer Review, Data Modeling, Databases, Stored Procedure, Relational Databases, Database Design, Query Languages, Data Science, Database Management, Big Data, Data Cleansing, Data Visualization Software, Software Development Tools, GitHub, Business Analysis, Cloud Computing, Data Analysis
Skills you'll gain: Dashboard, Data Visualization Software, Plotly, Data Visualization, Exploratory Data Analysis, Data Cleansing, Jupyter, Matplotlib, Data Analysis, Pandas (Python Package), Data Manipulation, Seaborn, Data Import/Export, Predictive Modeling, Predictive Analytics, Web Scraping, Interactive Data Visualization, Data Science, Automation, Python Programming
Skills you'll gain: Exploratory Data Analysis, Data Storytelling, Statistical Hypothesis Testing, Data Ethics, Data Visualization Software, Sampling (Statistics), Regression Analysis, Feature Engineering, Data Transformation, Descriptive Statistics, Data Visualization, Data Wrangling, Probability & Statistics, Tableau Software, Data Manipulation, Probability Distribution, Statistical Analysis, Advanced Analytics, Object Oriented Programming (OOP), Data Analysis
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Security Management, Threat Management, Intelligence Collection and Analysis, International Relations, Public Safety and National Security, Security Awareness, Risk Management, Threat Detection, Governance, Law, Regulation, and Compliance, Innovation, Policy Development
Skills you'll gain: Computer Systems, Business Software, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Computer Hardware, Information Systems Security, Data Storage, Patch Management, Artificial Intelligence
- Status: Free
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security Awareness Training, Threat Detection, General Networking, Vulnerability
Skills you'll gain: Data Mining, Big Data, Cloud Computing, Data Analysis, Data Science, Digital Transformation, Data-Driven Decision-Making, Business Logic, Deep Learning, Machine Learning, Artificial Intelligence
University of Michigan
Skills you'll gain: Data Structures, Python Programming, Data Manipulation, Development Environment, File Management, Data Analysis, Computer Programming, Software Installation
Skills you'll gain: Network Security, Hardening, Network Protocols, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, General Networking, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)
In summary, here are 10 of our most popular implementing data security and resource policies courses
- IBM Data Management: IBM
- Computer Networks and Network Security: IBM
- Play It Safe: Manage Security Risks: Google
- Introduction to Data Science: IBM
- Applied Data Science: IBM
- Google Advanced Data Analytics: Google
- International Security Management: Erasmus University Rotterdam
- Introduction to Computers and Operating Systems and Security: Microsoft
- Cybersecurity for Everyone: University of Maryland, College Park
- What is Data Science? : IBM