Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity strategy"
Skills you'll gain: Cybersecurity, Encryption, Cyber Attacks, Email Security, Computer Security Awareness Training, Security Awareness, Data Security, Information Systems Security, Malware Protection, Authentications, Authorization (Computing), Security Controls, Hardening, Identity and Access Management, Multi-Factor Authentication, Browser Compatibility
- Status: Free
University of London
Skills you'll gain: Corporate Strategy, Business Strategy, Organizational Strategy, Strategic Decision-Making, Business, Mergers & Acquisitions, Growth Strategies, New Business Development, Business Valuation, Resource Allocation, Analysis
Skills you'll gain: Security Controls, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Security Policies, Network Analysis, Security Information and Event Management (SIEM), Ethical Standards And Conduct, SQL
IE Business School
Skills you'll gain: Survey Creation, Marketing Planning, Market Research, Product Marketing, Consumer Behaviour, Value Propositions, Marketing, Market Analysis, Business Planning, Marketing Channel, Peer Review, Product Strategy, Target Market, Research Design, Data Analysis, Marketing Strategy and Techniques, Marketing Communications, Marketing Psychology, Strategic Marketing, Marketing Management
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Threat Detection, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Encryption, Cyber Threat Intelligence, Incident Management, Information Systems Security, Threat Management
University of California, Irvine
Skills you'll gain: Cyber Governance, Threat Management, Security Management, Cyber Risk, Compliance Management, Risk Management, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Information Assurance, Program Standards, Computer Security
Skills you'll gain: Continuous Monitoring, Incident Response, NIST 800-53, Risk Management Framework, Computer Security Incident Management, Business Continuity, Security Management, Disaster Recovery, Security Controls, Authorization (Computing), Risk Management, System Monitoring, Security Testing, Threat Management, Security Strategy, Cyber Security Policies, Cybersecurity, Cyber Risk, Configuration Management, Information Systems Security
Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, NIST 800-53, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR), Business Ethics
Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Cyber Governance, Cyber Security Strategy, Security Awareness, Technical Communication
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Security Management, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Cyber Attacks, Malware Protection, Email Security, Vulnerability Management, Artificial Intelligence
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Threat Modeling, Email Security, Security Engineering, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
Skills you'll gain: Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Security Awareness, Cyber Threat Intelligence, Malware Protection, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training
Searches related to cybersecurity strategy
In summary, here are 10 of our most popular cybersecurity strategy courses
- Introduction to Cybersecurity Essentials:Â IBM
- Corporate Strategy :Â University of London
- Foundations of Cybersecurity:Â Google
- Marketing Strategy:Â IE Business School
- Cybersecurity Operations Fundamentals:Â Cisco Learning and Certifications
- Security Governance & Compliance:Â University of California, Irvine
- NIST Cybersecurity and Risk Management Frameworks:Â Packt
- Cybersecurity Compliance Framework, Standards & Regulations:Â IBM
- Cybersecurity Policy Foundations:Â Infosec
- Cybersecurity Case Studies and Capstone Project:Â IBM