Filter by
The language used throughout the course, in both instruction and assessments.
Results for "strategic+understanding+of+compliance+and+triggers"
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Compliance Auditing, Communication Planning, Internal Communications, Procedure Development, Continuous Monitoring, Governance Risk Management and Compliance, Culture Transformation, Industrial and Organizational Psychology, Ethical Standards And Conduct, Psychology
ISC2
Skills you'll gain: Authentications, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Security Controls, IT Security Architecture, User Provisioning, Multi-Factor Authentication, User Accounts, Data Security, Application Security, Information Systems Security, Network Security, Information Assurance, Data Integrity, Network Architecture
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Information Privacy, Personally Identifiable Information, Regulatory Compliance, Compliance Management, Compliance Training, Data Security, Health Care Procedure and Regulation, Data Governance, Incident Response
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
University of Pennsylvania
Skills you'll gain: Compliance Management, Law, Regulation, and Compliance, Business Ethics, Internal Controls, Risk Analysis, Financial Controls, Auditing, Risk Management, Due Diligence, Employee Training, Policy Development, International Relations
Lund University
Skills you'll gain: Law, Regulation, and Compliance, International Relations, Regulatory Compliance, Business Economics, Compliance Management, Business Administration, E-Commerce, Public Policies, Labor Law, Organizational Structure, Financial Regulation, Economics, Tax Laws, Contract Review, Higher Education, Governance, Decision Making
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Skills you'll gain: Data Governance, Data Management, Information Management, Metadata Management, Data Strategy, Governance, Data Integrity, Cloud Management, Regulatory Requirements, Compliance Management, Data Quality, Data Security, Cloud Solutions
Skills you'll gain: Cybersecurity, Security Controls, Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, Security Management, Data Access, Enterprise Security, Authentications
University of Virginia
Skills you'll gain: Plan Execution, Organizational Strategy, Business Strategy, Data-Driven Decision-Making, Business Planning, Strategic Leadership, Strategic Decision-Making, Strategic Thinking, Governance, Analysis, Business Analysis, Competitive Analysis
Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, Infrastructure as Code (IaC), Cyber Security Policies, Security Controls, Security Strategy, Identity and Access Management, Threat Detection
- Status: Free
Amazon Web Services
Skills you'll gain: Data Governance, AWS Identity and Access Management (IAM), Cloud Security, Amazon Web Services, Cyber Governance, AWS SageMaker, Information Systems Security, Security Controls, IT Security Architecture
In summary, here are 10 of our most popular strategic+understanding+of+compliance+and+triggers courses
- Effective Compliance Programs: University of Pennsylvania
- Access Controls : ISC2
- Privacy Law and Data Protection: University of Pennsylvania
- Security Concepts and Practices: ISC2
- What is Corruption: Anti-Corruption and Compliance: University of Pennsylvania
- European Business Law: Understanding the Fundamentals: Lund University
- Cybersecurity Threat Vectors and Mitigation: Microsoft
- Fundamentals of Data Governance: Edureka
- Access Control Concepts: ISC2
- Strategic Planning and Execution: University of Virginia