Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber-gouvernance"
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cybersecurity, Cyber Threat Intelligence, Security Management, Security Awareness, Data Ethics, Data Security, Personally Identifiable Information, Technical Communication, Artificial Intelligence
- Status: NewStatus: Free Trial
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Threat Modeling, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, Computer Security Incident Management, Cloud Security, MITRE ATT&CK Framework, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Risk Management
- Status: NewStatus: Free Trial
Advancing Women in Tech
Skills you'll gain: Cyber Risk, Business Strategies, Technical Consulting, Business Communication
- Status: Free Trial
Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, Generative AI, Threat Detection, Cybersecurity, Incident Response, Intrusion Detection and Prevention, Malware Protection, Prompt Engineering, Anomaly Detection, Vulnerability Management, Artificial Intelligence
- Status: Preview
University of London
Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Cyber Risk, Encryption, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response
- Status: NewStatus: Free Trial
Advancing Women in Tech
Skills you'll gain: ISO/IEC 27001, Budget Management, Cyber Governance, Vendor Management, Leadership Development, Cyber Security Strategy, Risk Management, Business Risk Management, Performance Measurement, Business Metrics, Operational Efficiency
- Status: Preview
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Governance, Network Infrastructure, Conflict Management, Security Management, Political Sciences, Media and Communications, Psychology
- Status: Preview
Skills you'll gain: Cybersecurity, Business Continuity, Threat Detection, Endpoint Security, Disaster Recovery, Cyber Security Policies, Incident Response, Vulnerability Assessments, Network Security, Application Security, Governance Risk Management and Compliance, Cloud Security, Risk Management
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Criminal Investigation and Forensics, Investigation, File Systems, Mobile Security, Cybersecurity, Data Security, Threat Detection, Data Integrity, Graphical Tools, Digital Communications, Malware Protection, File Management, Computer Security Incident Management, Incident Response, Mobile Development Tools, Data Storage, Real Time Data, Disaster Recovery, Network Analysis, Regulation and Legal Compliance
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Risk Management Framework, Continuous Monitoring, Security Controls, Enterprise Security, Information Privacy
- Status: New
Google Cloud
Skills you'll gain: Data Governance, Google Workspace, Data Loss Prevention, Data Management, Information Management, Data Security, Personally Identifiable Information, Security Controls, Email Security, File Management, Data Storage, Record Keeping, Data Import/Export
University of London
Skills you'll gain: Key Management, Security Management, Human Factors (Security), Information Privacy, Security Testing, Cyber Governance, Infrastructure Security, Cryptography, Threat Modeling, Business Continuity Planning, Application Security, OSI Models, Malware Protection, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, Cyber Security Strategy, ISO/IEC 27001, Data Collection, Data Analysis
In summary, here are 10 of our most popular cyber-gouvernance courses
- Put It to Work: Prepare for Cybersecurity Jobs:Â Google
- Cybersecurity Prevention and Detection:Â Pearson
- Cybersecurity Teams, Influence & Legacy:Â Advancing Women in Tech
- Generative AI: Boost Your Cybersecurity Career :Â IBM
- Cyber Security Fundamentals:Â University of London
- Cybersecurity Metrics, Vendors & Risks:Â Advancing Women in Tech
- International Cyber Conflicts:Â The State University of New York
- Office of the CISO Institute: Cybersecurity Essentials:Â Google
- Cyber Security: Digital Forensics:Â Macquarie University
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University