Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security strategy"
- Status: Free Trial
Board Infinity
Skills you'll gain: Cyber Risk, Risk Management, Threat Management, Risk Mitigation, Vulnerability Management, Business Risk Management, Security Management, Enterprise Risk Management (ERM), Risk Analysis, Operational Risk, Risk Control, Cybersecurity, Governance Risk Management and Compliance, ISO/IEC 27001, Continuous Monitoring, Business Continuity, Incident Response, Compliance Management, Cost Benefit Analysis
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
- Status: Free Trial
Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, NIST 800-53, Infrastructure as Code (IaC), Security Controls, Google Cloud Platform, Cybersecurity, Identity and Access Management
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software)
Skills you'll gain: Incident Response, Cyber Risk, Threat Management, Security Controls, Vulnerability Assessments, Risk Management, Threat Modeling, Technical Communication, Cybersecurity, Business Continuity Planning, Business Risk Management, Disaster Recovery, Business Communication, Continuous Monitoring, Compliance Management
- Status: Free Trial
Infosec
Skills you'll gain: Cyber Governance, Security Management, Information Systems Security, Cybersecurity, Governance, Cyber Security Strategy, Cyber Risk, Information Assurance, Leadership, Change Management, Business Leadership
- Status: Preview
Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
- Status: Preview
Edureka
Skills you'll gain: Secure Coding, Generative AI, Intrusion Detection and Prevention, Threat Detection, Responsible AI, Cybersecurity, Application Security, Cyber Threat Intelligence, Network Security, Artificial Intelligence, Anomaly Detection, Incident Response, Data Analysis
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Threat Detection, Information Privacy, Safety and Security, Multi-Factor Authentication
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cybersecurity, Cyber Security Policies, Computer Security Awareness Training, Cyber Attacks, Cyber Threat Intelligence, Personally Identifiable Information, Information Privacy, Data Ethics, Authentications, General Data Protection Regulation (GDPR), Human Factors (Security), NIST 800-53, Identity and Access Management
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Cyber Security Strategy, Security Management, Cyber Attacks, Intrusion Detection and Prevention, Cyber Security Policies, Threat Detection, Disaster Recovery, Cyber Risk, Cybersecurity, Cyber Security Assessment, Crisis Management, Threat Management, Business Continuity, Safety and Security, Strategic Communication, Security Software, Regulation and Legal Compliance
In summary, here are 10 of our most popular cyber security strategy courses
- Risk Assessment and Management in Cybersecurity:Â Board Infinity
- Advanced Cybersecurity Techniques:Â Johns Hopkins University
- Strategies for Cloud Security Risk Management:Â Google Cloud
- Security Governance & Compliance:Â University of California, Irvine
- Cybersecurity Foundations: Threats Networks, and IoT Protection:Â Johns Hopkins University
- Risk Management for Cyber Security Managers:Â Packt
- Leadership:Â Infosec
- Cybersecurity and Secure Software Design:Â Ball State University
- Gen AI in Cybersecurity:Â Edureka
- Cybersecurity: What to Do When You Are a Victim:Â Kennesaw State University