Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security strategy"
Skills you'll gain: CI/CD, Open Web Application Security Project (OWASP), Istio, Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Jenkins, Bash (Scripting Language), Cloud Services, Git (Version Control System), DevOps, Jupyter, Grafana
Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Cloud Services, Cloud Platforms, General Networking, Windows PowerShell, Cyber Governance, Unix Commands, Cyber Security Strategy
Skills you'll gain: Data Storytelling, Performance Measurement, Data-Driven Decision-Making, E-Commerce, Digital Marketing, Branding, Marketing Channel, Marketing Strategy and Techniques, Customer Analysis, Advertising, Marketing Analytics, Search Engine Marketing, Customer Engagement, Content Marketing, Brand Awareness, Search Engine Optimization, Social Media Marketing, Target Audience
Google
Skills you'll gain: Generative AI, Artificial Intelligence and Machine Learning (AI/ML), Productivity Software, Artificial Intelligence, Data Ethics, Security Awareness, Business Workflow Analysis, Innovation, Automation, Workflow Management, Information Privacy, Human Computer Interaction, Content Creation, Natural Language Processing, Complex Problem Solving
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
- Status: Free
Skills you'll gain: Cloud Computing Architecture, Cloud Security, Cloud Infrastructure, Cloud Computing, Cloud Applications, IT Security Architecture, Cloud Services, Infrastructure Security, Application Security, Data Security, Cybersecurity, Security Controls, Risk Management Framework, Encryption
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cybersecurity, Computing Platforms, Hardware Troubleshooting, Computer Hardware, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Peripheral Devices, Cloud Platforms, Encryption, Data Storage, Cyber Attacks, Software Development Life Cycle, Networking Hardware, Application Development, Information Technology, Cloud Computing, Databases
- Status: [object Object]
Skills you'll gain: Generative AI, New Product Development, Product Management, Product Lifecycle Management, Product Development, Innovation, Product Roadmaps, ChatGPT, Product Planning, Commercialization, Product Strategy, Artificial Intelligence, Project Management Life Cycle, Data Ethics, OpenAI, Product Marketing, Stakeholder Management, Competitive Analysis, Product Testing, Artificial Intelligence and Machine Learning (AI/ML)
Ludwig-Maximilians-Universität München (LMU)
Skills you'll gain: Mergers & Acquisitions, Customer Retention, Business Research, Business Strategy, Organizational Structure, Organizational Strategy, Peer Review, Strategic Thinking, Game Theory, Competitive Analysis, Strategic Partnership, Product Strategy, Report Writing, Business Consulting, Growth Strategies, Organizational Effectiveness, Strategic Decision-Making, Organizational Change, Business Writing, Compliance Management
IIMA - IIM Ahmedabad
Skills you'll gain: Supply Chain Management, Supply Chain Planning, Supply Chain, Transportation Management, Digital Transformation, Transportation Operations, Logistics Management, Business Technologies, Inventory and Warehousing, Business Analytics, Data-Driven Decision-Making, Order Fulfillment, Warehouse Management, Technology Strategies, Warehouse Operations, Operational Efficiency, Process Optimization, Internet Of Things, Blockchain, Real Time Data
LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Penetration Testing, Cloud Computing, Cybersecurity, Mobile Security, Application Security, Cyber Threat Intelligence, Virtualization, Encryption, Cryptography, Vulnerability Assessments, SQL
Searches related to cyber security strategy
In summary, here are 10 of our most popular cyber security strategy courses
- IBM DevOps and Software Engineering:Â IBM
- Cybersecurity Foundations:Â Infosec
- Foundations of Digital Marketing and E-commerce:Â Google
- Google AI Essentials:Â Google
- Sound the Alarm: Detection and Response:Â Google
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Certified Cloud Security Professional (CCSP):Â Infosec
- Information Technology (IT) and Cloud Fundamentals:Â IBM
- IBM AI Product Manager:Â IBM
- Competitive Strategy and Organization Design: Ludwig-Maximilians-Universität München (LMU)