Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "manage security policies"
Skills you'll gain: Agile Software Development, Cloud Computing Architecture, Cloud Services, Agile Methodology, DevOps, Kanban Principles, Cloud Security, Cloud Infrastructure, Cloud Platforms, Cloud Computing, Agile Project Management, Cloud-Native Computing, User Story, Cloud Storage, Sprint Retrospectives, Sprint Planning, Workflow Management, CI/CD, Test Driven Development (TDD), Scrum (Software Development)
Skills you'll gain: System Configuration, Configuration Management, Cybersecurity, Security Awareness, Data Security, Security Controls, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Information Technology Operations, System Monitoring, Key Management, General Networking, Data Integrity
University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Server Administration, Authorization (Computing), Network Administration, Information Systems Security, Authentications
University of Geneva
Skills you'll gain: Portfolio Management, Wealth Management, Risk Management, Investment Management, Financial Market, Business Risk Management, Capital Markets, Investments, Market Liquidity, Asset Management, Performance Measurement, Market Dynamics, Environmental Social And Corporate Governance (ESG), Financial Planning, Derivatives, Finance, Equities, Financial Management, Performance Analysis, Business Ethics
Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Data Lakes, Amazon DynamoDB, Amazon Web Services, Serverless Computing, Cloud Computing, Amazon S3, Scalability, Cloud Infrastructure, Amazon Elastic Compute Cloud, Event-Driven Programming, Cloud Security, Solution Architecture, Data Visualization, Cloud Computing Architecture, Cloud Solutions, Data Architecture, Amazon Redshift, Software Architecture
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
- Status: Free
Campus BBVA
Skills you'll gain: Computer Security Incident Management, Cyber Attacks, Cybersecurity, Threat Management, Security Awareness, Cyber Risk, Email Security, Data Security, Network Security, Business Process, Mobile Security, Multi-Factor Authentication
University of Virginia
Skills you'll gain: Project Planning, Earned Value Management, Project Risk Management, Stakeholder Management, Risk Management, Project Management, Project Scoping, Project Schedules, Stakeholder Communications, Work Breakdown Structure, Dependency Analysis, Agile Methodology, Kanban Principles
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Data Integrity
Microsoft
Skills you'll gain: Multimedia, Microsoft PowerPoint, Microsoft Excel, Excel Formulas, Microsoft Word, Microsoft 365, Data Visualization, Presentations, Spreadsheet Software, Productivity Software, Data Analysis Software, Data Import/Export, Microsoft Windows, Microsoft Outlook, Proofreading, Editing, Document Management, Technical Documentation, Product Demonstration, Writing
- Status: Free
Universiteit Leiden
Skills you'll gain: Public Safety and National Security, Research, Research Methodologies, Policy Analysis, Media and Communications, Social Studies, International Relations, Political Sciences, Trend Analysis, Investigation, Psychology
Skills you'll gain: Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Security Awareness, Cyber Threat Intelligence, Malware Protection, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training
In summary, here are 10 of our most popular manage security policies courses
- DevOps, Cloud, and Agile Foundations:Â IBM
- Security Operations:Â ISC2
- Linux Server Management and Security:Â University of Colorado System
- Investment Management:Â University of Geneva
- AWS Cloud Solutions Architect:Â Amazon Web Services
- Operating Systems: Overview, Administration, and Security:Â IBM
- Cybersecurity for Managers:Â Campus BBVA
- Fundamentals of Project Planning and Management:Â University of Virginia
- Introduction to Cyber Attacks:Â New York University
- Microsoft 365 Fundamentals:Â Microsoft