Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security strategy"
- Status: NewStatus: Free Trial
Skills you'll gain: Disaster Recovery, System Monitoring, Event Monitoring, Kubernetes, Continuous Monitoring, Application Security, Hardening, Key Management, Encryption
- Status: Preview
EIT Digital
Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Management, Security Requirements Analysis, Data Access, Vulnerability Assessments, Data Management, Information Management, Big Data
- Status: Free Trial
Skills you'll gain: Operating System Administration, Desktop Support, Operating Systems, Command-Line Interface, Technical Support and Services, System Support, Help Desk Support, Mobile Security, Network Security, Microsoft Windows, Technical Support, Mac OS, Linux, System Configuration, Network Administration, Software Installation, Firewall, Encryption, Malware Protection
- Status: Free Trial
Google Cloud
Skills you'll gain: Authentications, Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Cloud Computing, Multi-Factor Authentication, Role-Based Access Control (RBAC), Authorization (Computing), Virtual Private Networks (VPN), Firewall, Network Security, Load Balancing
- Status: Free Trial
Skills you'll gain: Systems Integration, Enterprise Architecture, Cloud-Based Integration, Data Governance, Data Management, Security Strategy, Cloud Management, Enterprise Security, Security Management, Security Controls, Security Requirements Analysis, Threat Modeling, Continuous Monitoring, Cyber Security Strategy
- Status: Free Trial
Skills you'll gain: Microsoft Teams, Data Loss Prevention, Data Governance, Compliance Management, Role-Based Access Control (RBAC), Collaborative Software, Windows PowerShell, Security Management, Identity and Access Management, System Configuration, System Monitoring, Event Monitoring, Legal Technology
- Status: Free Trial
University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, World History, Risk Management Framework
Skills you'll gain: Threat Detection, Vulnerability Management, Cyber Threat Hunting, Vulnerability Assessments, Cloud Security, Multi-Cloud, Intrusion Detection and Prevention, Threat Management, Google Cloud Platform, Enterprise Security, Risk Management Framework
- Status: Free Trial
Skills you'll gain: Cloud Security, Identity and Access Management, Payment Card Industry (PCI) Data Security Standards, Data Security, Security Requirements Analysis, Security Engineering, Security Controls, Cloud Computing Architecture, Network Security, Encryption, Firewall, Continuous Monitoring, CI/CD, Key Management
- Status: Preview
Banco Interamericano de Desarrollo
Skills you'll gain: Policty Analysis, Research, and Development, Policy Development, Public Safety and National Security, Policy Analysis, Public Policies, Governance, Public Administration, Social Justice, Program Evaluation, Criminal Investigation and Forensics, Continuous Monitoring, Community Development, Conflict Management, Sociology
- Status: Free
Coursera Project Network
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Role-Based Access Control (RBAC), Authorization (Computing), User Accounts, Cloud Security, Data Security, Cloud Platforms, Command-Line Interface
- Status: Free Trial
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
In summary, here are 10 of our most popular cyber security strategy courses
- Monitoring, Security, and High Availability in Vault:Â Packt
- Security and Privacy for Big Data - Part 1:Â EIT Digital
- Core 2: OS, Software, Security and Operational Procedures:Â IBM
- Managing Security in Google Cloud en Français: Google Cloud
- Advanced Applications of CDO in Enterprise Security Admin:Â LearnQuest
- MS Teams – Security, Compliance, and Advanced Administration: Packt
- Homeland Security & Cybersecurity Connection - It's Not About the Terrorists:Â University of Colorado System
- Getting Started with Security Command Center Enterprise:Â Google Cloud
- Preparing for Your Professional Cloud Security Engineer Journey:Â Google Cloud
- Leaders in Citizen Security and Justice Management:Â Banco Interamericano de Desarrollo