Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security strategy"
University of Michigan
Skills you'll gain: Negotiation, Contract Negotiation, Conflict Management, Communication, Contract Management, Influencing, Planning, Decision Making, Ethical Standards And Conduct, Industrial and Organizational Psychology
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Presentation, Data Governance, Data Security, Data Migration, Database Design, Data Visualization, Interactive Data Visualization, Descriptive Statistics, Data Mining, Cloud Storage, Data Visualization Software, Extract, Transform, Load, IBM DB2, Data Management, MySQL, Excel Formulas
Skills you'll gain: Data Storytelling, Data Presentation, Interactive Data Visualization, Data Visualization Software, Data Visualization, Shiny (R Package), Data Wrangling, Exploratory Data Analysis, Statistical Visualization, Relational Databases, Big Data, Ggplot2, Database Design, Data Analysis, Data Mining, Dashboard, Excel Formulas, Data Manipulation, Web Scraping, Microsoft Excel
FAIR Institute
Skills you'll gain: Risk Analysis, Cyber Risk, Risk Modeling, Cybersecurity, Governance, Risk Management, Strategic Decision-Making, Enterprise Risk Management (ERM), Business Risk Management, Compliance Reporting, Management Reporting, Strategic Leadership, Business Communication, Technical Communication
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
Skills you'll gain: Cybersecurity, Business Continuity, Threat Detection, Endpoint Security, Disaster Recovery, Cyber Security Policies, Vulnerability Assessments, Network Security, Governance Risk Management and Compliance, Continuous Monitoring, Cloud Security, Risk Management
Skills you'll gain: Cloud Infrastructure, Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Load Balancing, System Monitoring, Infrastructure As A Service (IaaS), Network Performance Management, Network Monitoring, Cloud Applications, Kubernetes, Cloud Computing Architecture, Identity and Access Management, Network Architecture, Network Security, Cloud Computing, Cloud Management, Network Routing, Virtual Private Networks (VPN), Network Troubleshooting
Skills you'll gain: Vulnerability Management, Azure Active Directory, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Generative AI, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Single Sign-On (SSO), Microsoft Azure, Security Management, Cyber Security Policies, Identity and Access Management, Data Management, Records Management, Authentications, System Monitoring, Data Ethics, ChatGPT
Kennesaw State University
Skills you'll gain: Cyber Governance, Risk Management Framework, Risk Analysis, Risk Management, Threat Detection, Threat Management, Business Risk Management, Cyber Risk, Security Management, Governance, Cybersecurity, Cyber Security Strategy, Security Strategy, Asset Management
Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Workflow Management, Stakeholder Engagement, Cyber Operations, Cybersecurity, Stakeholder Management, Security Information and Event Management (SIEM), Incident Response, Security Management, Computer Security Incident Management, Cyber Attacks, Stakeholder Communications, Incident Management, Event Monitoring, Security Controls, Data Security, Customer Relationship Building, Network Security, Team Oriented
Kennesaw State University
Skills you'll gain: Internet Of Things, Cybersecurity, Cyber Security Strategy, Mobile Security, Security Awareness, Wireless Networks, Information Privacy, Network Security, Data Security, Emerging Technologies, Risk Management Framework
Edureka
Skills you'll gain: Cybersecurity, Secure Coding, Cyber Security Strategy, Threat Detection, Network Security, Application Security, IT Security Architecture, Generative AI, Endpoint Security, Incident Response, Artificial Intelligence, Automation
Searches related to cyber security strategy
In summary, here are 10 of our most popular cyber security strategy courses
- Successful Negotiation: Essential Strategies and Skills:Â University of Michigan
- IBM Data Management:Â IBM
- IBM Data Analytics with Excel and R:Â IBM
- Foundations of Cyber Risk Management and FAIRâ„¢:Â FAIR Institute
- Operating Systems: Overview, Administration, and Security:Â IBM
- Office of the CISO Institute: Cybersecurity Essentials:Â Google
- Preparing for Google Cloud Certification: Cloud Network Engineer:Â Google Cloud
- Microsoft Azure Cybersecurity Tools and Solutions:Â Microsoft
- Implementing a Risk Management Framework :Â Kennesaw State University
- Security Operations Center (SOC):Â Cisco Learning and Certifications