Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "apply security best practices"
DeepLearning.AI
Skills you'll gain: Data Ethics, Market Opportunities, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Team Building, Machine Learning, Strategic Thinking, Generative AI, Data Science, Deep Learning, Business Ethics, Artificial Neural Networks, Business Transformation
University of Minnesota
Skills you'll gain: Performance Management, Performance Appraisal, Performance Review, Employee Performance Management, Compensation Management, Compensation Strategy, Compensation and Benefits, Constructive Feedback, Workforce Planning, Human Resource Strategy, Human Resources, Employee Onboarding, Recruitment, Human Resources Management and Planning, Recruitment Strategies, Full Cycle Recruitment, Compensation Analysis, Talent Acquisition, People Management, Job Analysis
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
Skills you'll gain: Spreadsheet Software, Stakeholder Communications, Dashboard, Stakeholder Management, Data-Driven Decision-Making, Data Analysis, Analytical Skills, Data Presentation, Business Analysis, Quantitative Research, Systems Thinking
Skills you'll gain: Data Storytelling, Data Visualization, Data Presentation, Interactive Data Visualization, Tableau Software, Presentations, Data Visualization Software, Dashboard, Web Content Accessibility Guidelines, Design Elements And Principles
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
Skills you'll gain: Data Mining, Big Data, Cloud Computing, Data Analysis, Data Science, Digital Transformation, Data-Driven Decision-Making, Business Logic, Deep Learning, Machine Learning, Artificial Intelligence
Skills you'll gain: Security Controls, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Security Policies, Network Analysis, Security Information and Event Management (SIEM), Ethical Standards And Conduct, SQL
- Status: [object Object]
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
Skills you'll gain: Data Ethics, Data Analysis, Data Security, Google Sheets, Databases, Data Storage, Data Quality, Data Integrity, Data Management, Data Collection, Data Manipulation, Relational Databases, SQL, Metadata Management, Unstructured Data
Skills you'll gain: Data Cleansing, Sampling (Statistics), Data Integrity, Data Quality, Data Validation, Google Sheets, Data Analysis, Data Manipulation, SQL, Data Transformation, Spreadsheet Software, Microsoft Excel
Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, NIST 800-53, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR), Business Ethics
In summary, here are 10 of our most popular apply security best practices courses
- AI For Everyone:Â DeepLearning.AI
- Human Resource Management: HR for People Managers:Â University of Minnesota
- Security Concepts and Practices:Â ISC2
- Ask Questions to Make Data-Driven Decisions:Â Google
- Share Data Through the Art of Visualization:Â Google
- Advanced System Security Design:Â University of Colorado System
- What is Data Science? :Â IBM
- Foundations of Cybersecurity:Â Google
- Microsoft Cybersecurity Analyst:Â Microsoft
- Prepare Data for Exploration:Â Google