Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "manage security policies"
Kennesaw State University
Skills you'll gain: Risk Management, Security Management, Risk Management Framework, Threat Management, Operational Risk, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Risk Analysis, Risk Modeling, Compliance Management, Vulnerability Assessments, Threat Modeling, Continuous Improvement Process
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Threat Management, Malware Protection, Healthcare Industry Knowledge, Encryption, Data Security, Information Privacy, General Data Protection Regulation (GDPR), Digital Communications
Skills you'll gain: Incident Response, Data Centers, DevSecOps, Continuous Monitoring, System Monitoring, Threat Detection, Infrastructure Security, Microsoft Servers, IT Security Architecture, Information Technology Operations, Security Management, Payment Card Industry (PCI) Data Security Standards, Windows Servers, Microsoft Windows, IT Infrastructure, Systems Administration, Security Information and Event Management (SIEM), Security Testing, Disaster Recovery, IT Automation
University of Minnesota
Skills you'll gain: User Story, Agile Software Development, Software Design Patterns, Design Thinking, Software Development Methodologies, Agile Methodology, Agile Project Management, Process Mapping, Software Engineering, Kanban Principles, Software Development Life Cycle, Application Security, Scrum (Software Development), Object Oriented Design, Software Architecture, Software Quality (SQA/SQC), Requirements Analysis, Application Deployment, Lean Methodologies, Lean Manufacturing
- Status: Free
The University of Edinburgh
Skills you'll gain: Political Sciences, Liberal Arts, Social Studies, Psychology, Science and Research, Scientific Methods, Social Sciences, Research, Ethical Standards And Conduct, Public Policies
Skills you'll gain: Security Controls, Security Management, Information Systems Security, Information Assurance, Security Awareness, Data Ethics, Cyber Security Policies, Data Security, Information Privacy, Information Management, Change Control, Configuration Management
Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Security Controls, Vulnerability Assessments, Incident Response, Intrusion Detection and Prevention, Malware Protection, Network Architecture
Google Cloud
Skills you'll gain: Kubernetes, Identity and Access Management, Cloud-Native Computing, Google Cloud Platform, CI/CD, Containerization, Application Deployment, Cloud Management, Scalability, Cloud Computing, Cloud Infrastructure, Load Balancing, Continuous Integration, DevOps, Continuous Delivery, YAML, Data Storage, Cloud Applications, Application Performance Management, Authorization (Computing)
Northwestern University
Skills you'll gain: Influencing, Persuasive Communication, Design Thinking, Data-Driven Decision-Making, Leadership, Strategic Communication, Innovation, Collaboration, Business Leadership, Crisis Management, Negotiation, Organizational Leadership, Ideation, Team Leadership, Resource Allocation, Human Centered Design, Teamwork, Corporate Communications, Marketing Analytics, Data Science
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Planning And Design, Network Architecture, General Networking, Network Performance Management, Computer Networking, Wireless Networks, Software-Defined Networking, Algorithms, System Programming, Data Integrity, Virtualization
University at Buffalo
Skills you'll gain: Model Based Systems Engineering, Systems Engineering, Product Lifecycle Management, Intrusion Detection and Prevention, Security Controls, Performance Measurement, Anomaly Detection, Machine Controls, Incident Response, Digital Transformation, Vulnerability Assessments, Software Development Life Cycle, Product Engineering, Cybersecurity, Supply Chain Management, Manufacturing Processes, Supply Chain Planning, Data Sharing, Manufacturing Operations, Constructive Feedback
Rice University
Skills you'll gain: Project Scoping, Communication Planning, Cost Management, Scope Management, Project Schedules, Earned Value Management, Scheduling, Team Management, Quality Assurance, Stakeholder Management, Work Breakdown Structure, Risk Management, Organizational Structure, Procurement, Project Risk Management, Estimation, Project Documentation, Project Controls, Project Management, Project Management Life Cycle
In summary, here are 10 of our most popular manage security policies courses
- A General Approach to Risk Management:Â Kennesaw State University
- Cybersecurity in Healthcare (Hospitals & Care Centres):Â Erasmus University Rotterdam
- Data Center Security Management with Microsoft System Center:Â EDUCBA
- Software Development Lifecycle:Â University of Minnesota
- Introduction to Philosophy:Â The University of Edinburgh
- Security Operations and Administration:Â ISC2
- Cybersecurity Assessment: CompTIA Security+ & CYSA+:Â IBM
- Architecting with Google Kubernetes Engine:Â Google Cloud
- Organizational Leadership:Â Northwestern University
- Computer Communications:Â University of Colorado System