Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "implementing data security and resource policies"
University of Minnesota
Skills you'll gain: Enterprise Resource Planning, Business Systems, Change Management, Business Technologies, Organizational Change, System Implementation, IT Management, Business Process, Business Solutions, Business Management, Business
Imperial College London
Skills you'll gain: Linear Algebra, Dimensionality Reduction, NumPy, Regression Analysis, Calculus, Applied Mathematics, Probability & Statistics, Data Transformation, Jupyter, Data Science, Advanced Mathematics, Statistics, Machine Learning Algorithms, Geometry, Machine Learning Methods, Artificial Neural Networks, Algorithms, Data Manipulation, Mathematical Modeling, Python Programming
- Status: Free
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security Awareness Training, Threat Detection, General Networking, Vulnerability
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Systems Development Life Cycle, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Security Controls, Change Management, System Implementation, System Monitoring, Risk Analysis, Risk Mitigation, Software Development
Skills you'll gain: Spreadsheet Software, Stakeholder Communications, Dashboard, Stakeholder Management, Data-Driven Decision-Making, Data Analysis, Analytical Skills, Data Presentation, Business Analysis, Quantitative Research, Systems Thinking
Skills you'll gain: Data Cleansing, Sampling (Statistics), Data Integrity, Data Quality, Data Validation, Data Analysis, Data Processing, Data Manipulation, SQL, Data Transformation, Spreadsheet Software
- Status: New
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, Database Administration, MySQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Transformation, IBM DB2, Relational Databases, Jupyter, Generative AI
Johns Hopkins University
Skills you'll gain: Shiny (R Package), Rmarkdown, Exploratory Data Analysis, Regression Analysis, Leaflet (Software), Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Statistical Inference, Predictive Modeling, Statistical Hypothesis Testing, Data Visualization, Plotly, Machine Learning Algorithms, Interactive Data Visualization, Probability & Statistics, Knitr
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Linux Commands, Database Design, IBM Cognos Analytics, MySQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, IBM DB2, Data Visualization, Relational Databases, Dashboard, Stored Procedure, Data Architecture
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Application Deployment, Kubernetes, Containerization, Database Architecture and Administration, MySQL, PostgreSQL, Identity and Access Management, Cloud Storage, Data Migration, Cloud Services, Cloud Management, Virtual Machines, Cloud API, Cloud Computing, Oracle Databases, Cloud Security, Cloud Applications, Database Administration
Cisco Learning and Certifications
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Malware Protection, Network Monitoring, Network Administration, TCP/IP, Network Infrastructure, Infrastructure Security, Intrusion Detection and Prevention, Network Protocols, Load Balancing, Firewall, Cybersecurity, General Networking, Authorization (Computing), Web Applications, Security Controls, Web Servers, Authentications
In summary, here are 10 of our most popular implementing data security and resource policies courses
- Enterprise Systems: University of Minnesota
- Mathematics for Machine Learning: Imperial College London
- Cybersecurity for Everyone: University of Maryland, College Park
- Information Systems Auditing, Controls and Assurance: The Hong Kong University of Science and Technology
- Ask Questions to Make Data-Driven Decisions: Google
- Process Data from Dirty to Clean: Google
- IBM Relational Database Administrator: IBM
- Data Science: Johns Hopkins University
- Network Security: ISC2
- IBM Data Warehouse Engineer: IBM