Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "implementing data security and access management"
- Status: New
Multiple educators
Skills you'll gain: Dashboard, Pseudocode, Jupyter, Algorithms, Data Mining, Pandas (Python Package), Correlation Analysis, Web Scraping, NumPy, Probability & Statistics, Predictive Modeling, Big Data, Automation, Data Visualization Software, Data Collection, Software Development Tools, Data Science, GitHub, Machine Learning Algorithms, Unsupervised Learning
Skills you'll gain: Cloud Computing, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Computer Security Incident Management, Cloud Security, Operating Systems, Windows Servers, Endpoint Detection and Response, Network Routing, Microsoft Windows, Threat Management
Skills you'll gain:
University of Illinois Urbana-Champaign
Skills you'll gain: Business Strategy, Organizational Change, Stakeholder Management, Corporate Strategy, Organizational Strategy, Team Building, Strategic Leadership, Conflict Management, Leadership Development, Organizational Leadership, Business Management, Business Ethics, Team Management, Change Management, Organizational Effectiveness, Decision Making, Teamwork, Strategic Thinking, Team Leadership, Mergers & Acquisitions
Skills you'll gain: Dashboard, SQL, Descriptive Statistics, Jupyter, Statistical Analysis, Data Analysis, Probability Distribution, Pandas (Python Package), Data Visualization Software, Statistics, Data Visualization, Relational Databases, Statistical Hypothesis Testing, Web Scraping, Databases, Stored Procedure, Automation, Software Development Tools, Data Science, Python Programming
- Status: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
Skills you'll gain: SQL, Web Scraping, Data Transformation, Extract, Transform, Load, Data Architecture, Jupyter, Data Pipelines, Big Data, Data Warehousing, Data Governance, Relational Databases, Data Storage Technologies, Apache Hadoop, Databases, Data Manipulation, Stored Procedure, Database Management, Database Design, Automation, Python Programming
- Status: Free
The University of North Carolina at Chapel Hill
Skills you'll gain: Data Sharing, Data Management, File Management, Data Storage, Information Management, Metadata Management, Data Governance, Record Keeping, Data Security, Data Ethics, Information Privacy, Version Control
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, ISO/IEC 27001, Computer Security Awareness Training, Cyber Risk, Information Assurance
Skills you'll gain: Data Management, Data Collection, Data Governance, Data Analysis, Information Privacy, Data Quality, Data Storage, Data Security, Data-Driven Decision-Making, Data Architecture, Data Visualization Software, Big Data, Machine Learning
Skills you'll gain: Big Data, Data Analysis, Statistical Analysis, Apache Hadoop, Apache Hive, Data Collection, Data Mart, Data Warehousing, Data Storytelling, Apache Spark, Data Cleansing, Data Lakes, Data Visualization Software, SQL
University of California, Irvine
Skills you'll gain: Cost Estimation, Stakeholder Management, Project Risk Management, Project Schedules, Work Breakdown Structure, Project Performance, Estimation, Conflict Management, Risk Analysis, Quality Management, Risk Mitigation, Project Management, Timelines, Milestones (Project Management), Project Planning, Peer Review, Budgeting, Project Management Life Cycle, Scope Management, Change Management
In summary, here are 10 of our most popular implementing data security and access management courses
- Data Science Foundations: IBM
- IT Fundamentals for Cybersecurity: IBM
- IT Security: Defense against the digital dark arts : Google
- Strategic Leadership and Management: University of Illinois Urbana-Champaign
- Data Science Fundamentals with Python and SQL: IBM
- Microsoft Cybersecurity Analyst: Microsoft
- Data Engineering Foundations: IBM
- Research Data Management and Sharing: The University of North Carolina at Chapel Hill
- Security Management and Governance: Royal Holloway, University of London
- Introduction to Data Management: Meta