Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security policies"
- Status: Preview
Universiteit Leiden
Skills you'll gain: Risk Management, Business Risk Management, Operational Risk, Risk Analysis, Safety and Security, Environmental Issue, Cyber Security Strategy, Decision Making, Public Health
- Status: Free Trial
Skills you'll gain: Digital Transformation, Business Strategy, Cloud Computing Architecture, Competitive Analysis, Cloud Services, Business Transformation, Responsible AI, Cloud Security, Cloud Infrastructure, Big Data, Cloud Platforms, Data Analysis, Statistical Analysis, Cloud Hosting, Cloud Engineering, Cloud Solutions, Cloud Computing, Cloud Development, Generative AI, Data Science
- Status: NewStatus: Free Trial
Skills you'll gain: Threat Modeling, Risk Management, Risk Appetite, Continuous Monitoring, Risk Mitigation, Vulnerability Management, Threat Detection
- Status: NewStatus: Free Trial
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security, SQL
- Status: Free Trial
Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption, Data Manipulation
- Status: NewStatus: Free Trial
Skills you'll gain: Enterprise Risk Management (ERM), IT Management, Data Security, Disaster Recovery, Audit Planning, Information Technology, Risk Management, Information Systems Security, Data Validation, Compliance Management, Risk Mitigation, Data Governance, Information Assurance, Security Controls, Law, Regulation, and Compliance, Auditing, Data Integrity, Personally Identifiable Information, Identity and Access Management, Business Continuity
- Status: NewStatus: Preview
Coursera Instructor Network
Skills you'll gain: Open Web Application Security Project (OWASP), DevSecOps, Jenkins, Software Development Life Cycle, CI/CD, Application Security, Secure Coding, Continuous Integration, DevOps, Continuous Delivery, Vulnerability Scanning, Vulnerability Assessments, Software Quality Assurance, Security Awareness, Dependency Analysis, Compliance Management, Automation
- Status: Free Trial
EIT Digital
Skills you'll gain: Real-Time Operating Systems, Embedded Software, Embedded Systems, Internet Of Things, Cryptography, Operating Systems, Network Architecture, Network Security, Cybersecurity, Web Services, Encryption, Network Protocols, Public Key Cryptography Standards (PKCS), Wireless Networks, Threat Modeling, System Programming, Computer Programming, Software Engineering, C (Programming Language), Real Time Data
- Status: Free Trial
Skills you'll gain: Cloud Computing Architecture, Technical Support, Technical Support and Services, Cloud Services, Generative AI, Hardware Troubleshooting, IT Service Management, Cloud Security, Desktop Support, Cloud Platforms, Cybersecurity, Cloud Hosting, Cloud Engineering, Cloud Computing, Professional Networking, Data Storage, Peripheral Devices, Information Technology, Cloud Infrastructure, Customer Service
- Status: NewStatus: Free Trial
Skills you'll gain: Apple Hardware proficiency, iOS Development, Self Service Technologies
- Status: NewStatus: Free Trial
Skills you'll gain: Wide Area Networks, Network Troubleshooting, Network Monitoring, Software-Defined Networking, System Configuration, Network Performance Management, Firewall, Amazon Web Services, Cloud Services, Software As A Service, TCP/IP, Cloud Technologies, Network Security, Performance Tuning, Intrusion Detection and Prevention
- Status: NewStatus: Free Trial
Board Infinity
Skills you'll gain: VMware ESX Servers, Role-Based Access Control (RBAC), Virtual Local Area Network (VLAN), Virtual Machines, Network Switches, Virtualization, Performance Tuning, Data Storage, Infrastructure Security, Network Architecture, Hardening, Network Performance Management, Capacity Management, Network Security, Network Troubleshooting, Data Storage Technologies
In summary, here are 10 of our most popular cyber security policies courses
- Risk in Modern Society :Â Universiteit Leiden
- IBM & Darden Digital Strategy:Â IBM
- The Pearson Complete Course for CISM Certification: Unit 2:Â Pearson
- Certified Ethical Hacker (CEH): Unit 5:Â Pearson
- Database Essentials and Vulnerabilities:Â IBM
- CISA Certified Information Systems Auditor:Â Pearson
- Secure Coding: SSDLC, OWASP & SonarQube Essentials:Â Coursera Instructor Network
- Development of Secure Embedded Systems:Â EIT Digital
- IBM IT Support:Â IBM
- Apple Device Deployment Projects – Hands-On Implementation: Packt