Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security policies"
- Status: Free Trial
University of Colorado System
Skills you'll gain: Database Design, Software Design, Usability Testing, User Interface and User Experience (UI/UX) Design, Software Architecture, Software Design Patterns, Database Management, Systems Design, Technical Design, Application Security, Design Strategies, Operating Systems
École Nationale des Ponts et Chaussées
Skills you'll gain: Electric Power Systems, Transportation Operations, Socioeconomics, Corporate Sustainability, Market Analysis, Economics, Automation, Environmental Engineering, Cost Benefit Analysis, Public Policies, Environmental Science, Forecasting, Product Lifecycle Management
- Status: Free Trial
Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption
Skills you'll gain: Requirements Management, Robotic Process Automation, Requirements Elicitation, Business Process Automation, Requirements Analysis, Business Requirements, Stakeholder Engagement, Business Analysis, Automation, Business Process, Process Analysis, Stakeholder Communications, Project Scoping, Process Mapping
- Status: Free Trial
Skills you'll gain: Data Governance, Data Storytelling, Presentations, Data Management, Supply Chain Management, Data Analysis, Data Visualization Software, Data Quality, Analytical Skills, Data Cleansing, Data Collection, Spreadsheet Software, Data Validation
- Status: Free Trial
University of Toronto
Skills you'll gain: Diversity Awareness, Diversity and Inclusion, Innovation, Analysis, Design Thinking, Sociology, Market Opportunities, Social Justice, Data Ethics, Risk Mitigation
Peking University
Skills you'll gain: Computer Architecture, Hardware Architecture, Data Storage, Data Storage Technologies, Computer Hardware, Peripheral Devices, Operating Systems, Systems Architecture
- Status: Free Trial
Rice University
Skills you'll gain: Economics, Supply And Demand, Economic Development, Financial Policy, Market Dynamics, Business Economics, Business Metrics, Public Policies, Performance Metric, International Finance, Fiscal Management, Investments, Labor Relations, Financial Market
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Machine Learning Algorithms, Real-Time Operating Systems, Big Data, Product Development, Internet Of Things, Embedded Software, Analytics, Embedded Systems, Failure Analysis, File Systems, Debugging, New Product Development, Data Analysis, Machine Learning, General Networking, Telecommunications, IBM Cloud, Wireless Networks, Technical Communication, Simulations
University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Encryption, Vulnerability Assessments, Key Management, Public Key Cryptography Standards (PKCS), Authentications, Mobile Security, Data Integrity
- Status: Free Trial
Skills you'll gain: Blockchain, Digital Assets, FinTech, Business Modeling, Financial Systems, Emerging Technologies, Business Transformation, Distributed Computing, Transaction Processing, Identity and Access Management
- Status: Free Trial
Pontificia Universidad Católica del Perú
Skills you'll gain: User Story, Human Computer Interaction, Software Development Life Cycle, Functional Requirement, Unified Modeling Language, Requirements Analysis, Prototyping, Usability, User Experience, User Interface (UI) Design, User Requirements Documents, Persona (User Experience), Interaction Design, User Centered Design, Human Factors, System Requirements, Software Design, Human Centered Design, Software Engineering, Systems Development
In summary, here are 10 of our most popular cyber security policies courses
- Software Design as an Abstraction: University of Colorado System
- Mobilités et véhicules électriques : École Nationale des Ponts et Chaussées
- Database Essentials and Vulnerabilities: IBM
- Automation Business Analysis - Concepts and Principles: UiPath
- Using Data Analytics in Supply Chain: Unilever
- Gender Analytics for Innovation: University of Toronto
- 计算机组成 Computer Organization: Peking University
- Principles of Economics: Macroeconomics - The Big Picture: Rice University
- Developing Industrial Internet of Things: University of Colorado Boulder
- Introduction to Applied Cryptography: University of London