Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "implementing data security and resource policies"
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption
Macquarie University
Skills you'll gain: Pivot Tables And Charts, Data Storytelling, Power BI, Excel Formulas, Data Analysis Expressions (DAX), Data Visualization Software, Interactive Data Visualization, Microsoft Excel, Spreadsheet Software, Dashboard, Data Modeling, Data Cleansing, Data Manipulation, Excel Macros, Infographics, Data Transformation, Data Analysis Software, Data Validation, Data Analysis, Microsoft Power Platform
Stanford University
Skills you'll gain: Data Structures, Graph Theory, Algorithms, Network Model, Network Analysis, Computational Thinking, Theoretical Computer Science, Network Routing
Skills you'll gain: Data Governance, Data Management, Information Management, Metadata Management, Data Strategy, Governance, Data Integrity, Regulatory Requirements, Compliance Management, Data Quality, Data Security, Cloud Solutions, Cloud Security
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Audit Planning, Systems Development Life Cycle, Software Development Life Cycle, Auditing, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Security Controls, Change Management, System Implementation, Risk Analysis
Skills you'll gain: Interviewing Skills, Data Analysis, Google Analytics, Data Processing, Analytical Skills, Artificial Intelligence, R Programming, Data Storytelling, Project Documentation, Presentations, Portfolio Management, LinkedIn
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Mobile Security, Enterprise Security, Computer Security, Cyber Risk, Cyber Security Policies, Network Architecture, Security Controls
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Infrastructure Security, Authorization (Computing), Multi-Factor Authentication
Skills you'll gain: MySQL, Database Design, Version Control, Database Management Systems, Database Management, MySQL Workbench, Extract, Transform, Load, Data Modeling, Data Structures, SQL, Unix Commands, Relational Databases, Databases, Git (Version Control System), Database Systems, Stored Procedure, Object Oriented Programming (OOP), Unit Testing, Algorithms, Django (Web Framework)
Skills you'll gain: Jupyter, Computer Programming Tools, Data Analysis Software, Data Visualization Software, Data Science, GitHub, Big Data, R Programming, Statistical Programming, Application Programming Interface (API), Machine Learning, Cloud Computing, Git (Version Control System), Development Environment, Other Programming Languages, Query Languages
Skills you'll gain: Data Storytelling, Data Literacy, Data Visualization, Data Presentation, Interactive Data Visualization, Tableau Software, Presentations, Data Visualization Software, Dashboard, Web Content Accessibility Guidelines
- Status: AI skills
Skills you'll gain: Data Storytelling, Business Metrics, Key Performance Indicators (KPIs), Data Management, Data Collection, Data Governance, Bayesian Statistics, Data Analysis, Descriptive Statistics, Statistical Hypothesis Testing, Information Privacy, Data Cleansing, Pandas (Python Package), Data Visualization Software, Statistical Inference, Spreadsheet Software, Correlation Analysis, Google Sheets, Exploratory Data Analysis, Data Modeling
In summary, here are 10 of our most popular implementing data security and resource policies courses
- Network Security: ISC2
- Excel Skills for Data Analytics and Visualization: Macquarie University
- Graph Search, Shortest Paths, and Data Structures: Stanford University
- Fundamentals of Data Governance: Edureka
- Information Systems Auditing, Controls and Assurance: The Hong Kong University of Science and Technology
- Google Data Analytics Capstone: Complete a Case Study: Google
- Introduction to Cyber Security: New York University
- Introduction to Cybersecurity Tools & Cyberattacks: IBM
- Meta Database Engineer: Meta
- Tools for Data Science: IBM