Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security strategy"
- Status: Free Trial
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Penetration Testing, Computer Security Incident Management, Cloud Services, Business Continuity, Disaster Recovery, Security Controls, Generative AI, Configuration Management, Governance, Cloud Security, Cloud Technologies, Cybersecurity, Data Storage, Peripheral Devices, Application Security, Information Technology, Cryptography
- Status: NewStatus: Free Trial
Skills you'll gain: Governance, Governance Risk Management and Compliance, Enterprise Security, Compliance Management, Regulatory Requirements, Business Metrics, Performance Metric, Ethical Standards And Conduct
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Cybersecurity, Information Systems Security Assessment Framework (ISSAF), Cyber Security Strategy, Vulnerability Assessments, Cyber Threat Intelligence, Threat Modeling, Exploitation techniques, Cyber Security Policies, Computer Security, Security Controls, Data Security
- Status: Free Trial
Skills you'll gain: Cybersecurity, Information Technology, Cyber Security Strategy, Cyber Security Policies, Technical Support and Services, Technical Support, Computer Security Awareness Training, Security Awareness, Network Security, Data Security, Information Assurance, General Networking, Operating Systems, Computer Hardware
- Status: Free Trial
Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Security Strategy, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
- Status: Free Trial
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Exploitation techniques, Test Planning
- Status: Free Trial
University of Colorado System
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Risk Management, Enterprise Security, Vulnerability Assessments, Encryption, Network Security, Data Security, Security Awareness, Authentications
- Status: NewStatus: Free Trial
Advancing Women in Tech
Skills you'll gain: ISO/IEC 27001, Budget Management, Cyber Governance, Vendor Management, Leadership Development, Cyber Security Strategy, Risk Management, Business Risk Management, Performance Measurement, Business Metrics, Operational Efficiency
- Status: NewStatus: Free Trial
Skills you'll gain: Security Management, Risk Management Framework, Incident Management
- Status: NewStatus: Free Trial
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security), Network Analysis
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cost Benefit Analysis, Risk Management Framework, Risk Management, Risk Analysis, Cyber Risk, ISO/IEC 27001, Enterprise Risk Management (ERM), NIST 800-53, Business Risk Management, Risk Mitigation, Governance Risk Management and Compliance, Cybersecurity, Security Controls
- Status: NewStatus: Free Trial
Skills you'll gain: Disaster Recovery, Business Continuity, Threat Modeling, Threat Detection, Cyber Attacks, Security Awareness, Risk Analysis, Compliance Management, Regulatory Requirements, Business Analysis, Investigation
In summary, here are 10 of our most popular cyber security strategy courses
- IBM and ISC2 Cybersecurity Specialist:Â IBM
- The Pearson Complete Course for CISM Certification: Unit 1:Â Pearson
- Certified Ethical Hacker (CEH): Unit 1:Â Pearson
- Introduction to Cybersecurity Careers:Â IBM
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Introduction to Cybersecurity for Business:Â University of Colorado System
- Cybersecurity Metrics, Vendors & Risks:Â Advancing Women in Tech
- CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 4:Â Pearson
- Certified Ethical Hacker (CEH): Unit 4:Â Pearson