Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security strategy"
- Status: Free TrialStatus: AI skills
Google
Skills you'll gain: IT Security Architecture, Computer Networking, Operating System Administration, Package and Software Management, Network Troubleshooting, Systems Administration, IT Infrastructure, Cloud Management, TCP/IP, Network Security, File Systems, Microsoft Windows, Computer Security, Lightweight Directory Access Protocols, Computer Hardware, Technical Support, Software Installation, Interviewing Skills, Professional Development, Google Gemini
- Status: NewStatus: Free Trial
Skills you'll gain: Application Security, Information Management, Security Controls, Configuration Management, Security Engineering, Vulnerability Assessments, Security Requirements Analysis, Cloud Security, Software Development Life Cycle, Cloud Computing, System Implementation, Program Development, Change Control
- Status: Free TrialStatus: AI skills
Skills you'll gain: Data Engineering, Data Warehousing, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, SQL, Database Administration, MySQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Store, Generative AI, Data Import/Export, Data Security
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Network Security, Open Web Application Security Project (OWASP), SQL
- Status: NewStatus: Free Trial
Advancing Women in Tech
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Business Priorities, Enterprise Security, Security Awareness, Security Management, Regulatory Compliance, Compliance Management, Risk Management, Communication
- Status: NewStatus: Free Trial
Advancing Women in Tech
Skills you'll gain: Cyber Risk, Business Strategies, Technical Consulting, Business Communication
- Status: NewStatus: Free Trial
Skills you'll gain: DevSecOps, Cloud Security, Patch Management, Cyber Security Assessment, Cloud Computing, Application Security, Internet Of Things, Infrastructure Security, Vulnerability Assessments, Cloud Services, Continuous Monitoring
- Status: NewStatus: Free Trial
Skills you'll gain: Threat Modeling, Security Management, Risk Management, Disaster Recovery, Governance, Business Continuity, Application Security, Information Management, Risk Appetite, Security Controls, Continuous Monitoring, Configuration Management, Governance Risk Management and Compliance, Cybersecurity, Enterprise Security, Cloud Computing, Malware Protection, IT Management, Information Assurance, Test Planning
- Status: Free Trial
EC-Council
Skills you'll gain: Penetration Testing, Threat Modeling, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Security Awareness, Cybersecurity, Cloud Computing, Intrusion Detection and Prevention, Cyber Attacks, Application Security, Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
- Status: NewStatus: Free Trial
Skills you'll gain: Mobile Security, Wireless Networks, Network Security, Application Security, Internet Of Things, Cybersecurity, Information Systems Security, Infrastructure Security, Vulnerability Assessments, Encryption
- Status: NewStatus: Preview
LearnQuest
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Intrusion Detection and Prevention, Threat Detection, Anomaly Detection, Computer Security Incident Management, Scripting, Cyber Operations, Event Monitoring, Network Analysis, Network Monitoring, Automation, Machine Learning Algorithms
- Status: Free Trial
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Visualization, Data Security, Data Migration, Database Design, Data Governance, MySQL, Descriptive Statistics, Extract, Transform, Load, Data Store, Data Management, Relational Databases, Databases, Exploratory Data Analysis, Data Architecture, Excel Formulas, Business Intelligence
In summary, here are 10 of our most popular cyber security strategy courses
- Google IT Support:Â Google
- The Pearson Complete Course for CISM Certification: Unit 3:Â Pearson
- IBM Relational Database Administrator:Â IBM
- Practical Cybersecurity Fundamentals: Unit 3:Â Pearson
- The Cybersecurity Career Ladder:Â Advancing Women in Tech
- Cybersecurity Teams, Influence & Legacy:Â Advancing Women in Tech
- Practical Cybersecurity Fundamentals: Unit 4:Â Pearson
- The Pearson Complete Course for CISM Certification:Â Pearson
- Ethical Hacking Essentials (EHE):Â EC-Council
- Certified Ethical Hacker (CEH): Unit 6:Â Pearson