Search result for Data governance training Online Courses & Certifications
Get Course Alerts by Email
CISSP certification practice questions: Domain 1 & 2 - 2021
by Thor Pedersen | 234,000+ Enrollments Worldwide- 4.3
Security governance principles data owners, system owners) Data security controls...
$14.99
HI-FIVE: Health Informatics For Innovation, Value & Enrichment (Administrative/IT Perspective)
by Rita Kukafka- 4.7
Approx. 14 hours to complete
The training is role-based and uses case scenarios. This course is one of three related courses in the HI-FIVE training program, which has topics on population health, care coordination and interoperability, value-based care, healthcare data analytics, and patient-centered care. Measurement Issues: Tools, Approaches, and Governance Data Analytics in Clinical Settings Completion of HI-FIVE Training (Administrative/IT Perspective)...
AZ-104: Microsoft Azure Administrator - Full Course
by Anand Rao Nednur- 4.3
17.5 hours on-demand video
Module 02 – Governance and Compliance Module 10 – Data Protection Emmanuel Yeboah : The training delivery has been great so far, insightful content, and great practical labs....
$15.99
AWS Certified Cloud Practitioner - Complete NEW Course 2021
by Neal Davis | AWS Certified Solutions Architect & Developer- 4.7
12 hours on-demand video
Amazon EC2 User Data and Metadata And: AWS Data Pipeline, Amazon QuickSight, DocumentDB, Neptune, QLDB, Blockchain Management and Governance Hi, my name is Neal Davis - I'll be your instructor for this ultimate exam training for the AWS Cloud Practitioner. I created this comprehensive training course so that you get to ace your AWS exam and achieve your career goals....
$16.99
Introduction to Cybersecurity Tools & Cyber Attacks
by IBM Security Learning Services- 4.5
Approx. 20 hours to complete
The Insane Amounts of Data We're Using Every Minute (Infographic) IT Governance Process Pentest Process and Mile 2 CPTE Training...
Hacking Web Applications and Penetration Testing: Fast Start
by Muharrem AYDIN- 4.2
4 hours on-demand video
In the fourth stage of a penetration test, the tester attempts to maintain access to the system to steal any sensitive data or damaging systems. Find more in a database using SQL injection vulnerabilities: databases, tables and sensitive data such as passwords Access sensitive data using path traversal attack...
$15.99
The Tax Advantaged Investor: A Guide to Legal Tax Reduction!
- 4.3
As Ramón matured into a competent European trained ophthalmologist and Freemason he grew to loathe the ravaging governance of mother Spain. Our training puts you in direct contact with the attorneys, accountants, human resource specialists, managers, service employees, and realtors you need....