Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "implementing data security and resource policies"
Skills you'll gain: Network Security, Hardening, Network Protocols, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)
Skills you'll gain: Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
Skills you'll gain: Network Security, Incident Response, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Configuration Management, Cybersecurity, Security Awareness, Security Management, Computer Security Incident Management, Cyber Attacks, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)
Johns Hopkins University
Skills you'll gain: Shiny (R Package), Rmarkdown, Exploratory Data Analysis, Regression Analysis, Leaflet (Software), Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Statistical Inference, Predictive Modeling, Statistical Hypothesis Testing, Data Visualization, Plotly, Machine Learning Algorithms, Interactive Data Visualization, Probability & Statistics, Knitr
Stanford University
Skills you'll gain: Data Structures, Graph Theory, Algorithms, Bioinformatics, Theoretical Computer Science, Computational Thinking, Network Analysis, Network Routing, Mathematical Theory & Analysis, Analysis, Probability, Design Strategies, Computer Science
Skills you'll gain: Excel Formulas, Microsoft Excel, Data Cleansing, Data Analysis, Data Import/Export, Spreadsheet Software, Data Quality, Pivot Tables And Charts, Google Sheets, Data Entry, Data Manipulation, Information Privacy
University of Minnesota
Skills you'll gain: Human Resource Strategy, Human Resources, Human Resources Management and Planning, Compensation Management, People Management, Employee Performance Management, Labor Law, Industrial and Organizational Psychology, Employee Engagement, Team Motivation, Social Sciences, Economics
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
Skills you'll gain: Jupyter, Peer Review, Data Modeling, Data Science, Data Cleansing, Business Analysis, Data Processing, Predictive Modeling, Data Quality, Data Storytelling, User Feedback, Decision Tree Learning
Skills you'll gain: Data Storytelling, Data Presentation, Data Visualization, Interactive Data Visualization, Data Visualization Software, Dashboard, IBM Cognos Analytics, Tree Maps, Scatter Plots, Data Analysis, Pivot Tables And Charts, Microsoft Excel, Histogram
University of Colorado Boulder
Skills you'll gain: Algorithms, Data Structures, Graph Theory, Operations Research, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Computational Thinking, Pseudocode, Cryptography, Computer Science, Programming Principles, Encryption, Network Model, Linear Algebra, Combinatorics, Data Science, Advanced Mathematics, Mathematical Modeling, Design Strategies, Computer Programming
Skills you'll gain: Data Visualization Software, Plotly, Data Visualization, Dashboard, Interactive Data Visualization, Matplotlib, Seaborn, Data Analysis, Geospatial Information and Technology, Pandas (Python Package), Scatter Plots, Histogram, Heat Maps, Box Plots
In summary, here are 10 of our most popular implementing data security and resource policies courses
- Connect and Protect: Networks and Network Security: Google
- Play It Safe: Manage Security Risks: Google
- Certified in Cybersecurity: ISC2
- Data Science: Johns Hopkins University
- Algorithms: Stanford University
- Excel Basics for Data Analysis: IBM
- Preparing to Manage Human Resources: University of Minnesota
- Computer Networks and Network Security: IBM
- Data Science Methodology: IBM
- Data Visualization and Dashboards with Excel and Cognos: IBM