Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security and compliance governance"
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cryptography, Cyber Security Assessment, Cyber Risk, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Security Policies, Infrastructure Security, Security Awareness, Identity and Access Management
University of Michigan
Skills you'll gain: Data Structures, Python Programming, Data Manipulation, Development Environment, File Management, Data Analysis, Computer Programming, Software Installation
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Presentation, Data Governance, Data Security, Data Migration, Database Design, Data Visualization, Interactive Data Visualization, Descriptive Statistics, Data Mining, Cloud Storage, Data Visualization Software, Extract, Transform, Load, IBM DB2, Data Management, MySQL, Excel Formulas
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Cybersecurity, Configuration Management, Computing Platforms, Hardware Troubleshooting, Computer Hardware, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Peripheral Devices
Skills you'll gain: Dashboard, SQL, Descriptive Statistics, Jupyter, Statistical Analysis, Data Analysis, Probability Distribution, Pandas (Python Package), Data Visualization Software, Statistics, Data Visualization, Statistical Hypothesis Testing, Databases, Stored Procedure, Web Scraping, Relational Databases, Automation, Data Science, GitHub, Python Programming
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Cyber Governance, Risk Mitigation, Vendor Management, Risk Modeling, Threat Management, Vulnerability Assessments, Security Management, Cyber Risk, Compliance Management, Cyber Security Policies, Cybersecurity, Security Awareness, Cyber Security Strategy
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
University of California, Davis
Skills you'll gain: Data Governance, Data Quality, Data Validation, Data Management, Health Information Management and Medical Records, Data Cleansing, Data Integrity, Quality Assurance, Metadata Management, Health Care, Technical Communication, Change Control
Skills you'll gain: Data Storytelling, Data Presentation, Interactive Data Visualization, Data Visualization Software, Data Visualization, Shiny (R Package), Data Wrangling, Exploratory Data Analysis, Statistical Visualization, Relational Databases, Big Data, Ggplot2, Database Design, Data Analysis, Data Mining, Dashboard, Excel Formulas, Data Manipulation, Web Scraping, Microsoft Excel
University of California, Irvine
Skills you'll gain: Cyber Governance, Threat Management, Security Management, Cyber Risk, Compliance Management, Risk Management, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Information Assurance, Program Standards, Computer Security
University of Minnesota
Skills you'll gain: Cloud Security, Application Security, Network Security, Cloud Computing, Cybersecurity, Information Systems Security, Infrastructure Security, Public Key Infrastructure, Cryptography, Private Cloud, Vulnerability Assessments, Virtualization, Virtual Machines, Authentications, Encryption, Authorization (Computing)
- Status: Free
Universiteit Leiden
Skills you'll gain: Risk Management, Business Risk Management, Operational Risk, Risk Analysis, Safety and Security, Environmental Issue, Public Safety and National Security, Cyber Security Strategy
Searches related to security and compliance governance
In summary, here are 10 of our most popular security and compliance governance courses
- Cybersecurity and Its Ten Domains: Kennesaw State University
- Python Data Structures: University of Michigan
- IBM Data Management: IBM
- IBM and ISC2 Cybersecurity Specialist: IBM
- Data Science Fundamentals with Python and SQL: IBM
- Introduction to Cybersecurity & Risk Management: University of California, Irvine
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- Healthcare Data Quality and Governance: University of California, Davis
- IBM Data Analytics with Excel and R: IBM
- Security Governance & Compliance: University of California, Irvine