Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "implementing data security and resource policies"
Skills you'll gain: Jupyter, Peer Review, Data Modeling, Data Science, Data Cleansing, Business Analysis, Data Mining, Predictive Modeling, Data Quality, Data Storytelling, Analytical Skills, User Feedback, Decision Tree Learning, Stakeholder Engagement
Johns Hopkins University
Skills you'll gain: Shiny (R Package), Rmarkdown, Exploratory Data Analysis, Regression Analysis, Leaflet (Software), Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Statistical Inference, Statistical Hypothesis Testing, Predictive Modeling, Data Wrangling, Data Visualization, Plotly, Machine Learning Algorithms, Plot (Graphics), Knitr
Skills you'll gain: MySQL, Database Design, Version Control, Database Management Systems, Database Management, MySQL Workbench, Extract, Transform, Load, Data Modeling, Data Structures, SQL, Unix Commands, Relational Databases, Databases, Git (Version Control System), Database Systems, Stored Procedure, Object Oriented Programming (OOP), Unit Testing, Algorithms, Django (Web Framework)
Imperial College London
Skills you'll gain: Linear Algebra, Dimensionality Reduction, NumPy, Regression Analysis, Calculus, Applied Mathematics, Probability & Statistics, Feature Engineering, Jupyter, Advanced Mathematics, Data Science, Statistics, Machine Learning Algorithms, Machine Learning Methods, Statistical Analysis, Artificial Neural Networks, Algorithms, Data Manipulation, Python Programming, Machine Learning
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Linux Commands, Database Design, IBM Cognos Analytics, MySQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Store, IBM DB2, Relational Databases, Dashboard, File Management, Star Schema
Skills you'll gain: Data Cleansing, Sampling (Statistics), Data Integrity, Data Quality, Data Validation, Sample Size Determination, Data Analysis, Data Manipulation, SQL, Data Transformation, Spreadsheet Software
Skills you'll gain: Analytics, Business Analytics, Data Analysis, Data-Driven Decision-Making, Business Intelligence, Data Literacy, Big Data, Data Storytelling, Statistical Analysis, Microsoft Excel, Data Visualization Software, R Programming
- Status: Free
Universiteit Leiden
Skills you'll gain: Risk Management Framework, Safety and Security, Security Management, Threat Management, Public Safety and National Security, Cybersecurity, Incident Management, International Relations, Environmental Issue, Governance
University of California, Davis
Skills you'll gain: Data Governance, Presentations, Data Cleansing, Feature Engineering, SQL, Apache Spark, A/B Testing, Distributed Computing, Descriptive Statistics, Data Lakes, Data Quality, Data Storytelling, Data Analysis, Peer Review, Exploratory Data Analysis, Data Manipulation, Data Pipelines, Databricks, Database Design, Query Languages
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Prompt Engineering, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Services, Application Deployment, Virtual Machines, Security Controls, Cloud Computing, Application Development, Data Storage Technologies, Threat Management, Virtual Private Networks (VPN)
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Infrastructure Security, Authorization (Computing), Multi-Factor Authentication
In summary, here are 10 of our most popular implementing data security and resource policies courses
- Data Science Methodology: IBM
- Data Science: Johns Hopkins University
- Meta Database Engineer: Meta
- Mathematics for Machine Learning: Imperial College London
- IBM Data Warehouse Engineer: IBM
- Process Data from Dirty to Clean: Google
- Data-driven Decision Making: PwC
- Security & Safety Challenges in a Globalized World: Universiteit Leiden
- Learn SQL Basics for Data Science: University of California, Davis
- Network Security: ISC2