Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security strategy"
Columbia University
Skills you'll gain: Construction Management, Building Information Modeling, Environment Health And Safety, Construction Estimating, Project Schedules, Lean Methodologies, Work Breakdown Structure, Project Management, Project Management Life Cycle, Contract Management, Project Planning, Risk Management, Scheduling, Corporate Sustainability
Google Cloud
Skills you'll gain: Cloud Management, Serverless Computing, Google Cloud Platform, Digital Transformation, Data Governance, Cloud Services, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Cloud Infrastructure, Artificial Intelligence and Machine Learning (AI/ML), Data Strategy, Application Programming Interface (API), Real Time Data, Business Transformation, Artificial Intelligence, Data Management, Hybrid Cloud Computing, Data Warehousing, Cloud Computing, Data Security
- Status: Free
West Virginia University
Skills you'll gain: Auditing, Internal Controls, Financial Controls, Threat Detection, Anomaly Detection, Financial Auditing, Cybersecurity, Financial Data, Investigation, Analytics, Specialized Accounting, Advanced Analytics, Security Awareness, Financial Statement Analysis, Big Data, Business Ethics, Analysis, Data Analysis Software, Ethical Standards And Conduct
- Status: Free
Georgia Institute of Technology
Skills you'll gain: User Experience Design, Prototyping, User Centered Design, Usability, Requirements Analysis, User Interface (UI), Interaction Design, Usability Testing, User Research
Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Cyber Threat Intelligence, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Risk Management, Security Awareness, Information Systems Security, Cyber Operations, Cyber Security Policies, Incident Response, Computer Security Incident Management, Network Security, Risk Analysis
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Linux Commands, TCP/IP, General Networking, Scripting, MySQL, Data Structures
Skills you'll gain: Vulnerability Management, Azure Active Directory, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Generative AI, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Single Sign-On (SSO), Microsoft Azure, Security Management, Cyber Security Policies, Identity and Access Management, Data Management, Records Management, Authentications, System Monitoring, Data Ethics, ChatGPT
University of Washington
Skills you'll gain: Negotiation, Proposal Writing, Presentations, Verbal Communication Skills, Persuasive Communication, Event Planning, Business Writing, Peer Review, Business Correspondence, Meeting Facilitation, Communication Strategies, Public Speaking, Professional Networking, Data Visualization, Setting Appointments, Writing, Business Planning, Business Communication, Rapport Building, Telephone Skills
- Status: Free
Università Bocconi
Skills you'll gain: Food and Beverage, Hospitality, Restaurant Management, Product Knowledge, Product Quality (QA/QC), Global Marketing, Market Dynamics, Business Strategy, Consumer Behaviour, Competitive Analysis
Skills you'll gain: Debugging, Cybersecurity, Programming Principles, Python Programming, Scripting, Automation, File Management, Data Structures
- Status: [object Object]
Skills you'll gain: Data Storytelling, Business Metrics, Key Performance Indicators (KPIs), Marketing Analytics, Bayesian Statistics, Descriptive Statistics, Marketing Effectiveness, Statistical Hypothesis Testing, Target Audience, Marketing Strategies, Data Cleansing, Pandas (Python Package), Data Modeling, Data Analysis, Data Visualization Software, Spreadsheet Software, A/B Testing, Data Collection, Marketing, Interviewing Skills
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Regulatory Compliance, General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Communication Planning, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Business Ethics, Governance, Internal Controls, Risk Analysis
Searches related to cyber security strategy
In summary, here are 10 of our most popular cyber security strategy courses
- Construction Project Management:Â Columbia University
- Google Cloud Digital Leader Training:Â Google Cloud
- Forensic Accounting and Fraud Examination:Â West Virginia University
- Introduction to User Experience Design :Â Georgia Institute of Technology
- Cybersecurity Foundations for Risk Management:Â Kennesaw State University
- Akamai Network Engineering:Â Akamai Technologies, Inc.
- Microsoft Azure Cybersecurity Tools and Solutions:Â Microsoft
- Business English Communication Skills:Â University of Washington
- Food & Beverage Management: Università Bocconi
- Automate Cybersecurity Tasks with Python:Â Google