Filter by
The language used throughout the course, in both instruction and assessments.
Results for "data+compliance+and+security"
Skills you'll gain: Microsoft Azure, Cloud Security, Infrastructure Security, Kubernetes, Data Security, Virtual Machines, Remote Access Systems, Role-Based Access Control (RBAC), Data Storage Technologies, Identity and Access Management, Databases, Containerization, Database Management, Key Management, Encryption
Board Infinity
Skills you'll gain: AWS CloudFormation, Amazon CloudWatch, Cloud Security, Data Security, Amazon Web Services, Infrastructure as Code (IaC), Data Governance, AWS Identity and Access Management (IAM), Cyber Governance, Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Key Management, Security Controls, Amazon S3, Cryptography, System Monitoring, Configuration Management, System Configuration
Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, Security Controls, Cloud Security, Encryption, Data Security, Information Assurance, Cybersecurity, Identity and Access Management, Cloud Computing, Penetration Testing, Personally Identifiable Information, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Incident Management
Skills you'll gain: Resource Management, Control Objectives for Information and Related Technology (COBIT), IT Management, Compliance Auditing, Information Technology, Risk Management, Governance, Quality Assurance, Cloud Computing, Human Resources Management and Planning, Technology Strategies, Auditing, Information Technology Infrastructure Library, Business Intelligence, Compliance Management, Vendor Management, Service Management, Organizational Structure, Business Continuity
Johns Hopkins University
Skills you'll gain: Email Security, Malware Protection, Mobile Security, Cybersecurity, Network Security, Internet Of Things, Open Web Application Security Project (OWASP), Network Monitoring, Security Controls, TCP/IP, Threat Detection, Network Analysis, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Border Gateway Protocol, Infrastructure Security, Application Security, Information Systems Security, Threat Modeling, Network Routing
University of Colorado Boulder
Skills you'll gain: Web Scraping, Data Integration, Data Cleansing, Data Import/Export, Data Quality, Data Processing, Data Collection, Data Manipulation, SQL, MySQL, Databases, Query Languages, Extensible Markup Language (XML), Pandas (Python Package), Application Programming Interface (API), Python Programming
Skills you'll gain: Disaster Recovery, Risk Management, Compliance Management, Governance Risk Management and Compliance, Regulatory Requirements, Risk Analysis, Cloud Security, Business Continuity, Cyber Risk, Security Management, Vendor Management, Data Security, Business Analysis, Personally Identifiable Information
Skills you'll gain: Personally Identifiable Information, Information Technology Architecture, General Data Protection Regulation (GDPR), Information Privacy, Information Technology, Security Controls, Computer Security Awareness Training, Data Security, Emerging Technologies, Systems Development Life Cycle, Risk Management Framework, Enterprise Security, Disaster Recovery, Cloud Computing, Encryption, Authorization (Computing), Authentications, Artificial Intelligence
EIT Digital
Skills you'll gain: Information Privacy, Personally Identifiable Information, General Data Protection Regulation (GDPR), Data Ethics, Health Information Management and Medical Records, Health Care Procedure and Regulation, Regulation and Legal Compliance, Technology Strategies
Skills you'll gain: Cloud Security, Security Management, Data Management, Records Management, Cloud Computing Architecture, Data Security, General Data Protection Regulation (GDPR), Cloud Computing, Data Governance, Personally Identifiable Information, Information Privacy, Threat Detection, Microsoft Azure, Cybersecurity, Security Controls
SkillUp EdTech
Skills you'll gain: Cryptographic Protocols, Blockchain, Business Continuity, Cryptography, Disaster Recovery, Digital Assets, Vulnerability Assessments, Enterprise Security, Data Security, Law, Regulation, and Compliance, Application Frameworks, Cybersecurity, Information Systems Security, Network Security, Emerging Technologies, Distributed Computing, Transaction Processing
Searches related to data+compliance+and+security
In summary, here are 10 of our most popular data+compliance+and+security courses
- Azure: Compute, Storage, and Database Security: Whizlabs
- Teradata SQL and Data Management: Board Infinity
- AWS: Security, Governance, and Compliance: Whizlabs
- Protection of Information Assets: Packt
- Governance and Management of IT: Packt
- Information Assurance Analysis: Johns Hopkins University
- Data Collection and Integration: University of Colorado Boulder
- Governance, Risk, and Compliance: Packt
- Information Technology and Security Principles: Packt
- Privacy & Standardisation Capstone: EIT Digital