Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security policies"
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Environmental Policy, Energy and Utilities, Climate Change Mitigation, Environment, Public Policies, International Relations, Policy Analysis, Climate Change Adaptation, Governance, Sustainable Technologies, Pollution Prevention, Environmental Science, Forecasting, Emerging Technologies
- Status: Free TrialStatus: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Vulnerability Scanning, Threat Management, Cloud Computing, Authentications, Active Directory, Operating Systems, Data Management, Computer Security Incident Management
- Status: Preview
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Management, Data Validation, Technical Communication, Automation, Requirements Analysis, Machine Learning
- Status: Preview
Erasmus University Rotterdam
Skills you'll gain: Economic Development, Policy Analysis, International Relations, Research, Economics, Writing, Technical Communication, Diplomacy, Econometrics, Analysis, Market Dynamics
Skills you'll gain: Terraform, Data Validation, Infrastructure as Code (IaC), Acceptance Testing, Google Cloud Platform, Security Controls
- Status: Free Trial
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Data Security, Human Factors (Security), Software As A Service
Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)
- Status: NewStatus: Preview
Tata Institute of Social Sciences
Skills you'll gain: Public Policies, Policy Development, Policty Analysis, Research, and Development, Governance, Policy Analysis, Social and Human Services, Economics, Policy, and Social Studies, Program Implementation, Social Justice, Public Administration, Community Development, Diversity and Inclusion, Advocacy, Program Evaluation, Empowerment, Stakeholder Engagement
- Status: Preview
O.P. Jindal Global University
Skills you'll gain: International Relations, Diplomacy, Political Sciences, World History, Public Policies, Social Sciences, Policy Analysis, Economics, Case Studies, Governance, Security Strategy, Analytical Skills
- Status: Preview
University of Lausanne
Skills you'll gain: Health Policy, Public Health, Policy Development, Community Health, Health Systems, Environmental Policy, Health Assessment, Sustainable Development, Governance, Systems Thinking
- Status: Free Trial
University of Lausanne
Skills you'll gain: Public Health, Health Policy, Community Health, Health Disparities, Governance, Health Systems, Policy Development, Environmental Policy, Social Determinants Of Health, Health Assessment, Systems Thinking, Sustainable Development
Coursera Project Network
Skills you'll gain: Load Balancing, Network Routing, Amazon Web Services, Servers, Network Monitoring
In summary, here are 10 of our most popular cyber security policies courses
- Global Climate Change Policies and Analysis :Â University of Colorado Boulder
- Microsoft Cybersecurity Analyst:Â Microsoft
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Trade & investment: evidence-based policies for development:Â Erasmus University Rotterdam
- Validating Policies for Terraform on Google Cloud:Â Google Cloud
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Cyber Secure Coder (CSC-110) :Â Packt
- Making Public Policies Work: The Last-mile Delivery:Â Tata Institute of Social Sciences
- Foreign Policies of Great, Middle, and Small Powers:Â O.P. Jindal Global University
- HEALTHY URBAN SYSTEMS - PART 3 : Design and policies :Â University of Lausanne