Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security strategy"
- Status: NewStatus: Preview
Coursera Instructor Network
Skills you'll gain: Secure Coding, Agile Methodology, Security Management, Cyber Security Policies, Cyber Security Assessment, Technical Management, Performance Metric, Risk Management
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Anomaly Detection, Cyber Threat Intelligence, Intrusion Detection and Prevention, Cyber Security Strategy, Applied Machine Learning, Cybersecurity, Fraud detection, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Threat Detection, Malware Protection, Machine Learning, Network Analysis, Artificial Intelligence, Machine Learning Methods, MLOps (Machine Learning Operations), Artificial Neural Networks, Data-Driven Decision-Making
- Status: Free Trial
Skills you'll gain: Penetration Testing, Network Security, Threat Modeling, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Cloud Computing, Encryption, Malware Protection, Intrusion Detection and Prevention, Identity and Access Management, Cyber Attacks, Data Integrity
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Fraud detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Security Strategy, Threat Modeling, Email Security, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
- Status: Preview
University of London
Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Cyber Risk, Encryption, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response
- Status: Free Trial
University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
- Status: Free Trial
Skills you'll gain: Cyber Governance, Security Management, Incident Management, Cyber Security Strategy, Business Continuity Planning, Business Continuity, Disaster Recovery, IT Management, Information Systems Security, Cybersecurity, Governance, Cyber Risk, Cyber Security Policies, Security Controls, Asset Management, Security Requirements Analysis, Cyber Security Assessment, Information Assurance, Risk Analysis, Leadership
- Status: Free Trial
Infosec
Skills you'll gain: Cyber Governance, Security Management, Incident Management, Cyber Security Strategy, Business Continuity Planning, Business Continuity, Disaster Recovery, Cyber Security Policies, Information Systems Security, Governance, Security Controls, Asset Management, Security Requirements Analysis, Cyber Security Assessment, Risk Analysis, Risk Management, Strategic Planning, Resource Management, Performance Metric
- Status: Free Trial
Skills you'll gain: Risk Management Framework, Cyber Risk, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cybersecurity, Continuous Monitoring, Security Management, Cyber Governance, Risk Management, Security Controls, Infrastructure Security, Cyber Security Assessment, Incident Response, Vulnerability Assessments, Authorization (Computing), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
- Status: Free Trial
Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Data Ethics, NIST 800-53, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Security Controls, Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR)
- Status: Free Trial
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Endpoint Detection and Response, Data Security, Cryptographic Protocols, Cyber Attacks, Advanced Encryption Standard (AES), Cyber Security Strategy, Secure Coding, Data Encryption Standard, Computer Security Awareness Training, Technical Support and Services, Information Technology, Computer Security Incident Management
- Status: Free Trial
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Exploit development, Cloud Security, Security Strategy, Computer Security Awareness Training, Risk Management, Enterprise Security
In summary, here are 10 of our most popular cyber security strategy courses
- Cybersecurity & Data Privacy for Technical Product Managers: Coursera Instructor Network
- Cyber Security: Application of AI: Macquarie University
- Cybersecurity Attack and Defense Fundamentals: EC-Council
- AI for Cybersecurity: Johns Hopkins University
- Cyber Security Fundamentals: University of London
- Cyber Security – Technology and Governance: University of London
- Cybersecurity Leadership and Management: Infosec
- Governance and Strategy: Infosec
- Cybersecurity Risk Management Framework: Infosec
- Cybersecurity Compliance Framework, Standards & Regulations: IBM