Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Policy Course Catalog
Alfaisal University | KLD
Skills you'll gain: Financial Policy, Public Administration, Economics, Policy, and Social Studies, Economic Development, Economics, Budgeting, Fiscal Management, Public Policies, Policy Analysis
Skills you'll gain: Group Policy, Azure Active Directory, Active Directory, Microsoft Azure, Windows Servers, Hybrid Cloud Computing, Authentications, Identity and Access Management, Infrastructure As A Service (IaaS), Single Sign-On (SSO), User Accounts, Multi-Factor Authentication, Disaster Recovery, Authorization (Computing)
Kennesaw State University
Skills you'll gain: Cybersecurity, Computer Security Awareness Training, Cyber Attacks, Cyber Risk, Personally Identifiable Information, Threat Detection, Information Privacy, Authentications, General Data Protection Regulation (GDPR), Human Factors (Security), NIST 800-53
Skills you'll gain: Enterprise Architecture, Personally Identifiable Information, Information Privacy, IT Security Architecture, Information Assurance, Information Technology, Security Controls, Security Awareness, Data Security, Emerging Technologies, Cyber Risk, Cloud Security, Risk Management Framework, Systems Development Life Cycle, Disaster Recovery, Cloud Computing, Encryption
University of California, Davis
Skills you'll gain: Innovation, Digital Transformation, Digital Communications, Business Transformation, Data Storage, Media and Communications, Virtual Teams, Computational Thinking, Artificial Intelligence, Information Privacy, Scalability, Machine Learning
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Mobile Security, Application Deployment, Endpoint Security, Threat Management, Apple iOS, System Configuration, iOS Development, Threat Detection, Cyber Security Policies, Network Security, Event Monitoring
- Status: New
University of Illinois Urbana-Champaign
Skills you'll gain: Water Resources, Land Management, Environmental Engineering, Natural Resource Management, Environmental Policy, Environmental Regulations, Environment and Resource Management, Environmental Laws, Civil Engineering, Environmental Science, Community Development, Mitigation, International Relations, Governance
Johns Hopkins University
Skills you'll gain: Public Health, Health Disparities, Health Equity, Medical Records, Vital Signs, Health Policy, Record Keeping, Data Quality, Health Information Management, Data Collection, Diversity Equity and Inclusion Initiatives
Google Cloud
Skills you'll gain: Information Privacy, Generative AI, Data Ethics, Google Cloud Platform, Personally Identifiable Information, Data Security, Cloud Security, Safety and Security, Artificial Intelligence, Machine Learning Methods, Encryption
Google Cloud
Skills you'll gain: Cloud API, Application Programming Interface (API), Google Cloud Platform, Cloud Security, Load Balancing, Threat Management, Threat Detection
Politecnico di Milano
Skills you'll gain: Business Modeling, Corporate Sustainability, Environmental Social And Corporate Governance (ESG), Digital Transformation, Systems Thinking, Business Transformation, Business Strategies, Business Economics, Product Lifecycle Management, Environment and Resource Management, Waste Minimization, Finance, Policy Analysis
Alfaisal University | KLD
Skills you'll gain: Economics, Policy, and Social Studies, Socioeconomics, Economics, Social Studies, Social Sciences, Public Policies, Policy Analysis
In summary, here are 10 of our most popular policy courses
- الدين الحكومي وعجز الموازنة : Alfaisal University | KLD
- Managing Identity Services using AD DS and Microsoft Entra: SkillUp EdTech
- What Is Cybersecurity?: Kennesaw State University
- Information Technology and Security Principles: Packt
- Digital Innovation: How to Build Digital Processes: University of California, Davis
- Check Point Jump Start: Harmony Mobile: Check Point Software Technologies Ltd.
- Wetland Regulation: Local to Global Perspective: University of Illinois Urbana-Champaign
- Civil Registration & Vital Statistics in Population Health: Johns Hopkins University
- Responsible AI for Developers: Privacy & Safety: Google Cloud
- Protecting APIs with Apigee X and Cloud Armor: Google Cloud