Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "implementing data security and resource policies"
Skills you'll gain: Data Pipelines, Dataflow, Google Cloud Platform, Real Time Data, Data Lakes, Data Storage, MLOps (Machine Learning Operations), Data Analysis, Dashboard, Data Warehousing, Data Processing, Extract, Transform, Load, Data Infrastructure, Cloud Storage, Big Data, Tensorflow, Unstructured Data, Data Management, Data Integration, Data Visualization Software
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Security Management, Threat Management, Intelligence Collection and Analysis, International Relations, Public Safety and National Security, Security Awareness, Risk Management, Threat Detection, Governance, Law, Regulation, and Compliance, Innovation, Policy Development
Skills you'll gain: Data Visualization Software, Plotly, Data Visualization, Dashboard, Interactive Data Visualization, Matplotlib, Seaborn, Data Analysis, Geospatial Information and Technology, Pandas (Python Package), Scatter Plots, Histogram, Heat Maps, Box Plots
Skills you'll gain: Computer Systems, Business Software, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Computer Hardware, Information Systems Security, Data Storage, Patch Management, Artificial Intelligence
Skills you'll gain: Data Ethics, Data Analysis, Data-Driven Decision-Making, Google Sheets, Business Analytics, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Visualization Software, SQL
Skills you'll gain: Network Security, Hardening, Network Protocols, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
Stanford University
Skills you'll gain: Data Structures, Graph Theory, Algorithms, Bioinformatics, Theoretical Computer Science, Computational Thinking, Network Analysis, Network Routing, Mathematical Theory & Analysis, Analysis, Probability, Design Strategies, Computer Science
University of Minnesota
Skills you'll gain: Human Resource Strategy, Human Resources, Human Resources Management and Planning, Compensation Management, People Management, Employee Performance Management, Labor Law, Industrial and Organizational Psychology, Employee Engagement, Team Motivation, Social Sciences, Economics
Skills you'll gain: Network Security, Incident Response, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Configuration Management, Cybersecurity, Security Awareness, Security Management, Computer Security Incident Management, Cyber Attacks, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)
Johns Hopkins University
Skills you'll gain: Shiny (R Package), Rmarkdown, Exploratory Data Analysis, Regression Analysis, Leaflet (Software), Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Statistical Inference, Predictive Modeling, Statistical Hypothesis Testing, Data Visualization, Plotly, Machine Learning Algorithms, Interactive Data Visualization, Probability & Statistics, Knitr
Skills you'll gain: Jupyter, Peer Review, Data Modeling, Data Science, Data Cleansing, Business Analysis, Data Processing, Predictive Modeling, Data Quality, Data Storytelling, User Feedback, Decision Tree Learning
In summary, here are 10 of our most popular implementing data security and resource policies courses
- Preparing for Google Cloud Certification: Cloud Data Engineer: Google Cloud
- International Security Management: Erasmus University Rotterdam
- Data Visualization with Python: IBM
- Introduction to Computers and Operating Systems and Security: Microsoft
- Foundations: Data, Data, Everywhere: Google
- Connect and Protect: Networks and Network Security: Google
- Computer Networks and Network Security: IBM
- Algorithms: Stanford University
- Preparing to Manage Human Resources: University of Minnesota
- Certified in Cybersecurity: ISC2