Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security strategy"
- Status: Free Trial
Skills you'll gain: Linux Administration, Docker (Software), Containerization, Linux, Network Troubleshooting, Linux Servers, Ansible, Kubernetes, Authentications, Infrastructure as Code (IaC), Network Administration, System Configuration, Remote Access Systems, Multi-Factor Authentication, Network Protocols, Network Security, Security Controls, Firewall, Web Servers, Encryption
- Status: NewStatus: Preview
SkillsBooster Academy
Skills you'll gain: Marketing Automation, Strategic Leadership, Dashboard, Business Intelligence, Business Marketing, Marketing Strategies, Strategic Marketing, AI Personalization, Business Strategy, Marketing Analytics, Customer Analysis, Generative AI, Business Modeling, Deepseek, Market Analysis, Content Marketing, Media Planning, Prompt Engineering, Online Advertising, Digital Marketing
- Status: Free Trial
Skills you'll gain: Network Troubleshooting, Network Monitoring, Network Administration, Network Security, Firewall, Ansible, Network Protocols, Software-Defined Networking, Puppet (Configuration Management Tool), Chef (Configuration Management Tool), Real Time Data, Scripting, JSON, Automation, Application Programming Interface (API)
- Status: Free Trial
IE Business School
Skills you'll gain: Product Marketing, Value Propositions, Target Market, Marketing, Product Strategy, Market Analysis, Marketing Strategy and Techniques, Market Trend, Competitive Analysis, Consumer Behaviour
- Status: Preview
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
- Status: Preview
University of Michigan
Skills you'll gain: Intellectual Property, Strategic Decision-Making, Decision Making, Arbitration, Mediation, Business Ethics, Leadership, Law, Regulation, and Compliance, Business Strategy, Talent Acquisition, Contract Management, Innovation, Regulatory Compliance, Human Resources, Product Development, Business Risk Management, Business Modeling
- Status: NewStatus: Free Trial
Skills you'll gain: Network Troubleshooting, Distributed Denial-Of-Service (DDoS) Attacks, Network Administration, Hardening, Network Monitoring, Intrusion Detection and Prevention, Cybersecurity, Network Protocols, Firewall, General Networking, Network Performance Management, Authentications, Identity and Access Management, Encryption, Hardware Troubleshooting, Virtual Local Area Network (VLAN), Key Management, Wireless Networks, Data Integrity
- Status: NewStatus: Free Trial
Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Infrastructure Security, Data Security, Security Management, Vulnerability Management, Vulnerability Assessments, Application Security, Key Management, User Provisioning, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Authorization (Computing), Encryption
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
- Status: NewStatus: Free Trial
Skills you'll gain: Apple software proficiency, Apple iOS, Apple Hardware proficiency, Mac OS, Application Deployment, Enterprise Application Management, Mobile Security, Package and Software Management, Hardening, Malware Protection, Software Installation, Software Testing, Configuration Management
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Database Architecture and Administration, Apache Hadoop, Query Languages, Big Data, Databases, SQL, Data Access, Distributed Computing, Performance Tuning, Data Processing, Data Integrity, Data Storage Technologies, Algorithms
- Status: NewStatus: Free Trial
Skills you'll gain: Application Deployment, Open Web Application Security Project (OWASP), CI/CD, Docker (Software), Bash (Scripting Language), Cloud Development, DevOps, Containerization, IT Automation, Cloud Hosting, Load Balancing, Ansible, Infrastructure As A Service (IaaS), Secure Coding, Application Security, Firewall, Servers, Unit Testing
In summary, here are 10 of our most popular cyber security strategy courses
- Advanced Linux Networking and Security:Â Packt
- DeepSeek R1 for AI Marketing and Business Strategy:Â SkillsBooster Academy
- Network Assurance, Security, and Automation:Â Packt
- Positioning: What you need for a successful Marketing Strategy:Â IE Business School
- In the Trenches: Security Operations Center :Â EC-Council
- Making Successful Decisions through the Strategy, Law & Ethics Model:Â University of Michigan
- Network Security, Troubleshooting, & Certification Prep:Â Packt
- AWS: Security and Key Management:Â Whizlabs
- ISC2 Systems Security Certified Practitioner (SSCP):Â ISC2
- Advanced Apple Platform Security, Integrations, & Management:Â Packt