Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security strategy"
- Status: Free Trial
Skills you'll gain: Linux Administration, Docker (Software), Containerization, Linux, Network Troubleshooting, Linux Servers, Ansible, Kubernetes, Authentications, Infrastructure as Code (IaC), Network Administration, System Configuration, Remote Access Systems, Multi-Factor Authentication, Network Protocols, Network Security, Security Controls, Firewall, Web Servers, Encryption
- Status: Free Trial
Skills you'll gain: Network Troubleshooting, Network Monitoring, Network Administration, Network Security, Firewall, Ansible, Network Protocols, Software-Defined Networking, Puppet (Configuration Management Tool), Chef (Configuration Management Tool), Real Time Data, Scripting, JSON, Automation, Application Programming Interface (API)
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Microsoft Azure, Cloud Security, Virtual Private Networks (VPN), Network Security, Vulnerability Assessments, Continuous Monitoring, Data Security, Key Management, Kubernetes, Security Controls, Hardening, Database Architecture and Administration, Authentications, Network Administration, Network Routing, Remote Access Systems, User Accounts, Authorization (Computing)
- Status: Preview
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
- Status: NewStatus: Free Trial
Skills you'll gain: Network Troubleshooting, Distributed Denial-Of-Service (DDoS) Attacks, Network Administration, Hardening, Network Monitoring, Intrusion Detection and Prevention, Cybersecurity, Network Protocols, Firewall, General Networking, Network Performance Management, Authentications, Identity and Access Management, Encryption, Hardware Troubleshooting, Virtual Local Area Network (VLAN), Key Management, Wireless Networks, Data Integrity
- Status: NewStatus: Free Trial
Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Infrastructure Security, Data Security, Security Management, Vulnerability Management, Vulnerability Assessments, Application Security, Key Management, User Provisioning, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Authorization (Computing), Encryption
- Status: Free Trial
IE Business School
Skills you'll gain: Product Marketing, Value Propositions, Target Market, Marketing, Product Strategy, Market Analysis, Marketing Strategy and Techniques, Market Trend, Competitive Analysis, Consumer Behaviour
- Status: Preview
University of Michigan
Skills you'll gain: Intellectual Property, Strategic Decision-Making, Decision Making, Arbitration, Mediation, Business Ethics, Leadership, Law, Regulation, and Compliance, Business Strategy, Talent Acquisition, Contract Management, Innovation, Regulatory Compliance, Human Resources, Product Development, Business Risk Management, Business Modeling
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
- Status: NewStatus: Free Trial
Skills you'll gain: Apple software proficiency, Apple iOS, Apple Hardware proficiency, Mac OS, Application Deployment, Enterprise Application Management, Mobile Security, Package and Software Management, Hardening, Malware Protection, Software Installation, Software Testing, Configuration Management
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Database Architecture and Administration, Apache Hadoop, Query Languages, Big Data, Databases, SQL, Data Access, Distributed Computing, Performance Tuning, Data Processing, Data Integrity, Data Storage Technologies, Algorithms
- Status: NewStatus: Free Trial
Skills you'll gain: Data Integrity, Data Integration, Power BI, Data Maintenance, Database Management, Microsoft SQL Servers, Relational Databases, Databases, Application Programming Interface (API), Dashboard, Data Visualization, Data Quality, Interactive Data Visualization, Business Intelligence, Data Security, Systems Integration, Role-Based Access Control (RBAC), Auditing, Real Time Data, Data Encryption Standard
In summary, here are 10 of our most popular cyber security strategy courses
- Advanced Linux Networking and Security:Â Packt
- Network Assurance, Security, and Automation:Â Packt
- AZ-500: Microsoft Azure Security Technologies:Â Packt
- In the Trenches: Security Operations Center :Â EC-Council
- Network Security, Troubleshooting, & Certification Prep:Â Packt
- AWS: Security and Key Management:Â Whizlabs
- Positioning: What you need for a successful Marketing Strategy:Â IE Business School
- Making Successful Decisions through the Strategy, Law & Ethics Model:Â University of Michigan
- ISC2 Systems Security Certified Practitioner (SSCP):Â ISC2
- Advanced Apple Platform Security, Integrations, & Management:Â Packt