Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security strategy"
Cisco Learning and Certifications
Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Cybersecurity, Network Security, Security Information and Event Management (SIEM), Network Monitoring, Network Analysis, Intrusion Detection and Prevention, Event Monitoring, Continuous Monitoring, Threat Detection, Incident Response
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, Peripheral Devices, Cybersecurity, Configuration Management, Computing Platforms, Cloud Security, Network Troubleshooting, Cloud Platforms, Encryption, Data Storage, Cyber Attacks
- Status: New AI skills
Google
Skills you'll gain: Threat Modeling, Network Security, Threat Management, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Attacks, Cybersecurity, Network Protocols, Professional Networking, Vulnerability Assessments, Bash (Scripting Language), Operating Systems, Security Controls, Debugging, Interviewing Skills, Python Programming
Skills you'll gain: Information Systems Security, Network Security, Computer Security, Application Security, Security Awareness, Cybersecurity, Cyber Attacks, Encryption, Data Security, Cryptography, Security Strategy, Information Technology, Security Management, Authorization (Computing), Threat Management, Firewall, Authentications, Identity and Access Management, Threat Detection, Hardening
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
University of Pennsylvania
Skills you'll gain: People Analytics, Data-Driven Decision-Making, Human Capital, Business Analytics, Descriptive Analytics, Business Intelligence, Financial Data, Marketing Analytics, Analytics, Talent Management, Financial Analysis, Predictive Analytics, Human Resources Management and Planning, Peer Review, Business Analysis, Financial Statement Analysis, Financial Forecasting, Customer Insights, Workforce Planning, Demand Planning
University of Pennsylvania
Skills you'll gain: Operations Management, Return On Investment, Operational Efficiency, Financial Statements, Financial Statement Analysis, Human Capital, Go To Market Strategy, Process Analysis, Branding, People Management, Financial Reporting, Capital Budgeting, Financial Accounting, Financial Modeling, Balance Sheet, Consumer Behaviour, Human Resource Strategy, Marketing Planning, Peer Review, Analysis
Skills you'll gain: Cybersecurity, Encryption, Cyber Attacks, Email Security, Computer Security Awareness Training, Security Awareness, Data Security, Network Security, Malware Protection, Authentications, Authorization (Computing), Security Controls, Hardening, Identity and Access Management, Information Privacy, Multi-Factor Authentication, System Configuration
Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Cyber Security Strategy, Incident Response, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis, Ethical Standards And Conduct
- Status: AI skills
Skills you'll gain: Prompt Engineering, Istio, HTML and CSS, Node.JS, Software Development Life Cycle, Software Architecture, Kubernetes, Unit Testing, Object-Relational Mapping, Cloud Computing Architecture, Server Side, Application Deployment, React Redux, Cloud Services, Cloud-Native Computing, Git (Version Control System), Full-Stack Web Development, Cloud Computing, Jupyter, Interviewing Skills
Skills you'll gain: Network Security, Incident Response, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, Configuration Management, Cybersecurity, Security Management, Cyber Attacks, Computer Security Awareness Training, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Threat Detection, Role-Based Access Control (RBAC), Authorization (Computing), Cyber Security Policies
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Business Continuity Planning, Continuous Monitoring, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Incident Response, Application Security, Incident Management, Security Engineering, Data Security, Network Security, OSI Models, Data Loss Prevention
Searches related to security strategy
In summary, here are 10 of our most popular security strategy courses
- Data Security:Â Cisco Learning and Certifications
- IBM and ISC2 Cybersecurity Specialist:Â IBM
- Google Cybersecurity:Â Google
- IT Security: Defense against the digital dark arts :Â Google
- Application Security for Developers and DevOps Professionals:Â IBM
- Business Analytics:Â University of Pennsylvania
- Business Foundations:Â University of Pennsylvania
- Introduction to Cybersecurity Essentials:Â IBM
- Foundations of Cybersecurity:Â Google
- IBM Full Stack Software Developer:Â IBM