Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security policies and frameworks"
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Database Management, Apache Hadoop, Query Languages, Big Data, Databases, SQL, Data Access, Distributed Computing, Performance Tuning, Data Processing, Data Integrity, Authorization (Computing), Data Storage Technologies, Algorithms
- Status: NewStatus: Free Trial
Skills you'll gain: Google Cloud Platform, Cost Management, Cloud Management, System Monitoring, Application Performance Management, Cloud Security, Identity and Access Management, Key Management, Infrastructure as Code (IaC), Continuous Monitoring, Encryption, Serverless Computing, Event-Driven Programming, Real Time Data
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cyber Governance, Crisis Management, Incident Response, Cyber Operations, Leadership Studies, Security Strategy, Communication, Leadership, Organizational Leadership, Enterprise Security, Culture Transformation, Business Risk Management
- Status: Free Trial
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management
- Status: Free Trial
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Firewall, Virtualization and Virtual Machines, Virtualization, Containerization, User Accounts, Docker (Software)
- Status: Free Trial
Skills you'll gain: Computer Systems, Business Software, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Computer Hardware, Information Systems Security, Computer Architecture, Data Storage, Patch Management, Microsoft 365, Artificial Intelligence, Cloud Computing
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cyber Threat Intelligence, Security Testing, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Information Systems Security, Threat Modeling, Security Engineering, DevSecOps, Data Security, Cyber Governance, Artificial Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Risk Management, Encryption, Machine Learning, Application Programming Interface (API), Regulation and Legal Compliance, Governance, Applied Machine Learning
- Status: Free Trial
Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Security, Cloud Computing, Cybersecurity, Infrastructure Security, Authentications, Authorization (Computing), Public Cloud, Network Security, Data Storage, Identity and Access Management, Data Centers, Encryption
- Status: Free Trial
Skills you'll gain: Network Security, Virtualization, Augmented and Virtual Reality (AR/VR), Virtual Machines, Cloud Computing, Firewall, Virtual Private Networks (VPN), Mobile Security, Network Troubleshooting, Computer Networking, Cloud Security, Peripheral Devices
- Status: Free Trial
Skills you'll gain: Disaster Recovery, Microsoft Azure, Microsoft Copilot, Cloud Security, Continuous Monitoring, Systems Administration, Cloud Storage, Patch Management, Virtual Machines, Identity and Access Management, Data Security
- Status: Free Trial
University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Cybersecurity, Intrusion Detection and Prevention, Encryption, Proxy Servers, Information Privacy, Web Servers, System Configuration, Cloud Hosting
- Status: Free Trial
Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Attacks, Cloud Computing, Zero Trust Network Access, Cybersecurity, Cyber Security Strategy, Network Security, Infrastructure Security, Threat Detection, Security Controls, Disaster Recovery, Authentications
In summary, here are 10 of our most popular security policies and frameworks courses
- Distributed Query Optimization and Security: Johns Hopkins University
- GCP: Monitoring, Security, and Costs: Whizlabs
- Cyber Security for Managers and Leaders: Macquarie University
- Security Operations: ISC2
- Operating Systems: Overview, Administration, and Security: IBM
- Introduction to Computers and Operating Systems and Security: Microsoft
- AI Security: Risks, Defences and Safety: Macquarie University
- Trust and Security with Google Cloud: Google Cloud
- Advanced Networking, Virtualization, and IT Security: Packt
- Azure Backup, Security, and Compliance Administration: Microsoft