Courses Filter Courses by Category: All _DEV SANDBOX Category 1 Category 1 Cybersecurity & Regulation Cybersecurity & Regulation Cybersecurity & Regulatory Compliance Cybersecurity & Regulatory Compliance Cybersecurity & Risk Cybersecurity & Risk Cybersecurity & Risk Management Cybersecurity & Risk Management Cybersecurity & Vendor Risk Cybersecurity & Vendor Risk Cybersecurity Regulation Data & Governance Data & Governance Data Privacy Data Privacy Data Privacy & Compliance Data Privacy & Compliance Data Privacy & Governance Data Privacy & Governance Data Privacy & Security Data Privacy & Security Development Finance & Inclusion Development Finance & Inclusion Development Finance & Institutional Strategy Development Finance & Institutional Strategy Development Finance & Social Impact Development Finance & Social Impact Digital Currency & Monetary Innovation Digital Currency & Monetary Innovation Directive (EU) 2022/2555 (NIS2) DORA – Proof of Concept (Valeria) eGovernment & Digital Infrastructure eGovernment & Digital Infrastructure Enterprise Hybrid Infrastructure with Microsoft Enterprise IT Enterprise IT EU Agencies & Security Policy EU DORA EU DORA Audit Readiness EU DORA Checklists EU DORA Corrective & Preventive Actions EU DORA Legal EU DORA Logs EU DORA Policies EU GDPR EU GDPR Audit readiness EU GDPR Checklists EU GDPR Corrective & Preventive Actions EU GDPR Legal EU GDPR Logs EU GDPR Policies EU Institutions & Governance EU Institutions & Governance EU Law & Human Rights EU Law & Human Rights EU Law & Judicial Institutions EU Law & Judicial Institutions EU Law & Legislative Instruments EU Law & Legislative Instruments EU Law & Treaty Frameworks EU Law & Treaty Frameworks EU Monetary Policy & Financial Institutions EU Monetary Policy & Financial Institutions EU Strategy & Policy EU Strategy & Policy Executive Leadership & Cybersecurity Executive Leadership & Cybersecurity Executive Leadership & Risk Management Executive Leadership & Risk Management Executive Leadership & Technology Finance & Regulation Finance & Regulation Financial Education & Inclusion Financial Education & Inclusion Financial Inclusion & Development Strategy Financial Inclusion & Development Strategy Financial Regulation & Risk Financial Regulation & Risk Fintech & Inclusion Fintech & Inclusion Governance & Risk Oversight Governance & Risk Oversight HR Industrial Systems & Operations Industrial Systems & Operations Information Governance & Compliance Information Governance & Compliance Information Governance & Security Information Governance & Security Information Security Information Security Information Security & Governance Information Security & Governance Information Security & Risk Information Security & Risk Infrastructure & Automation Infrastructure & Automation Infrastructure Hybride en Entreprise Avec Microsoft ISO 27001 ISO 27001 Audit readiness ISO 27001 Checklists ISO 27001 Legal ISO 27001 Logs ISO 27001 Policies ISO 27001Corrective & Preventive Actions IT Governance & Risk IT Governance & Risk IT Governance & Strategy IT Governance & Strategy Leadership & Organizational Development Leadership & Organizational Development Leadership & People Development Leadership & People Development Leadership & Transformation Leadership & Transformation Logistics & Operations Logistics & Operations Logistics & Strategy Logistics & Strategy Microsoft Hybride Infrastructure Training Module 1 – Introduction & Scope Monetary Innovation & Community Development Monetary Innovation & Community Development Monetary Policy & Sovereign Finance Monetary Policy & Sovereign Finance New Course NIS2 Audit readiness NIS2 Checklists NIS2 Corrective & Preventive Actions NIS2 Logs NIS2 Policies Operations & Risk Operations & Risk Operations & Technology Operations & Technology Payment Security Payment Security Privacy & Communication Privacy & Communication Privacy & Compliance Privacy & Compliance Privacy & Customer Trust Privacy & Data Governance Privacy & Documentation Privacy & Documentation Privacy & Governance Privacy & Information Security Privacy & Information Security Privacy & Legal Basis Privacy & Legal Basis Privacy & Regulation Privacy & Regulation Privacy & Risk Privacy & Risk Project Management Project Management Public Sector & Digital Transformation Public Sector & Digital Transformation Public Sector & Technology Public Sector & Technology Quality & Compliance Quality & Regulatory Affairs Quality & Standards Regulation & Technology Regulation & Technology Regulatory Affairs & Product Compliance Regulatory Affairs & Product Compliance Regulatory Compliance Regulatory Compliance Regulatory Compliance & Risk Regulatory Compliance & Risk Resilience & Continuity Resilience & Continuity Resilience & Governance Resilience & Governance Resilience & IT Continuity Resilience & IT Continuity Resilience & Operations Resilience & Standards Resource Economics & Sustainable Development Risk & Compliance Risk & Continuity Risk & Governance Risk & Leadership Risk & Resilience Risk Management & Governance Rural Finance & Development Strategy Safety & Compliance Safety & Standards Standards & Resilience Strategy & Execution Strategy & Transformation Sustainability & Compliance Sustainability & Governance Sustainability & Regulation Sustainability & Regulatory Compliance Sustainability & Risk Sustainability & Standards Technology & Infrastructure Technology & Innovation Technology Strategy & Corporate Development Urban Innovation & Public Infrastructure Sort by: Default A to Z Sort Z to A Sort by latest Sort by oldest Privacy & Regulation HIPAA Made Simple – Understanding and Applying HIPAA Requirements for Privacy, Security, and Compliance in Healthcare and Beyond (C96-F-P) Privacy & Regulation HIPAA Made Simple – Understanding and Applying HIPAA Requirements for Privacy, Security, and Compliance in Healthcare and Beyond (C96-I) EU DORA ICT Asset Classification and CMDB EU DORA ICT Disaster Recovery Plans EU DORA ICT Incident Management EU DORA ICT Incident Management Playbooks EU DORA ICT Incident Reporting EU DORA ICT Risk Management Documentation EU DORA ICT Risk Management Policies EU DORA ICT Risk Management Tools EU DORA ICT Third Party Contract Playbook Identity & Access Governance Essentials – A selection of premium courses for an amazing value (B02-B) Prev 123133134135136137138139223224225 Next