Search result for Key policies Online Courses & Certifications
Get Course Alerts by Email
e-Learning course on Innovative Business Models for Expanding Fiber-Optic Networks and Closing the Access Gaps
by OLC and SURR- 0.0
6 Weeks
The second module provides information on key spectrum policies and technology trends that are relevant for efforts to expand access to broadband. The conclusion of the course is intended to provide participants with a set of key considerations and recommendations for use in evaluation of approaches to expanding broadband infrastructure....
$5
COSO 2013 Control Activity Compliance
by Illumeo Learning- 4
2 hours on-demand video
Control Activities are actions defined through policies and procedures that help ensure management directives to mitigate risks to the achievement of objectives are carried out. The organization deploys control activities through policies that establish what is expected and procedures that put policies into place....
$12.99
From Poverty to Prosperity: Understanding Economic Development
by Paul Collier- 0.0
6 Weeks
Learn about the role of government and the key political, social, and economic processes that elevate any society from poverty to prosperity. The role of government and the key political, social and economic processes that affect development;...
$169
Human-Centered Design for Inclusive Innovation
by Sarah Kaplan , Nika Stelman , Mark Leung- 5
Approx. 13 hours to complete
In this course, you will learn about and experience key human-centered design practices: empathize, reframe, ideate, prototype and test....
A to Z of Azure security - Covers AZ 500, 300,103 and more
by Varma Rudra- 4.7
16 hours on-demand video
Roles Based Access Control - Introduction to role based access control; Custom role creation and assignment; Dynamic groups creation and assignment; Introduction to Azure AD App registrations; Creation of service principle and access Azure resource; Introduction to Managed Identities; Creation of managed service identity & access key vault. Implement conditional based access policies in AAD...
$21.99
Inclusive Growth
by Dmitriy Rozhkov , Valerie Cerra- 0.0
6 Weeks
Explain the role of fiscal policy in supporting inclusive growth and highlight best practices for designing tax policies and expenditure programs to foster inclusion. Identify why good governance is important for inclusive growth and summarize the policies to improve it....
$25
RabbitMQ With Spring Boot Messaging (Inc. Docker Clustering)
by Senol Atac- 3.4
4.5 hours on-demand video
Routing Key Policies...
$12.99
Related searches
Collateral Securities A Comprehensive Study
by Raja Natarajan, B.Com., PGDBA, FCA- 2.5
1.5 hours on-demand video
d) Advances against Life Insurance Policies Have a note pad and pen along side to take note of key point....
$12.99
Gender Analytics for Innovation
by Sarah Kaplan- 4.8
Approx. 8 hours to complete
Gender Analytics is a way to analyze your products, services, processes and policies with a gender lens to uncover hidden opportunities for innovation and effectiveness. Why are gender-neutral policies are not necessarily gender-equal? Develop fluency in key concepts of Gender Analytics, including language associated with sex, gender, gender identity and intersectionality....
The Foundations of Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 9 hours to complete
● Define key concepts and terminology in Cybersecurity Key Concepts in Cybersecurity - Part 1 (Lecture 1. Key Concepts in Cybersecurity - Part 2 (Lecture 1. Key Concepts in Cybersecurity - Part 1 (Quiz 1. Key Concepts in Cybersecurity - Part 2 (Quiz 1. Define key concepts and terminology in Cybersecurity Describe key threats to cybersecurity...