Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security strategy"
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, Network Architecture, Routing Protocols, Network Protocols, OSI Models, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks
- Status: [object Object]
Google
Skills you'll gain: Computer Networking, Network Troubleshooting, Package and Software Management, Systems Administration, Cloud Infrastructure, IT Infrastructure, TCP/IP, Desktop Support, Network Security, Network Architecture, Computer Hardware, Linux, Encryption, Microsoft Windows, Lightweight Directory Access Protocols, Cybersecurity, Security Awareness, Technical Support, Software Installation, Help Desk Support
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Application Specific Integrated Circuits, Cryptography, Encryption, Technical Design, Emerging Technologies, System Design and Implementation
Kennesaw State University
Skills you'll gain: Network Security, Security Management, Firewall, Cyber Attacks, Network Monitoring, Cybersecurity, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, Continuous Monitoring, TCP/IP, Intrusion Detection and Prevention, Threat Detection, Mobile Security, Cryptography, Encryption
University of Michigan
Skills you'll gain: Negotiation, Contract Negotiation, Conflict Management, Communication, Contract Management, Influencing, Planning, Decision Making, Ethical Standards And Conduct, Industrial and Organizational Psychology
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
University of Pennsylvania
Skills you'll gain: Operations Management, Return On Investment, Operational Efficiency, Financial Statements, Financial Statement Analysis, Finance, Human Capital, Go To Market Strategy, Process Analysis, Branding, People Management, Financial Reporting, Capital Budgeting, Financial Accounting, Operational Performance Management, Consumer Behaviour, Leadership and Management, Marketing Planning, Peer Review, Analysis
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
Skills you'll gain: Open Web Application Security Project (OWASP), Istio, Software Development Life Cycle, Linux Commands, Unit Testing, Application Deployment, Kubernetes, NoSQL, Bash (Scripting Language), MongoDB, Shell Script, Django (Web Framework), Object-Relational Mapping, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Jupyter, Grafana
DeepLearning.AI
Skills you'll gain: Data Ethics, Market Opportunities, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Team Building, Machine Learning, Strategic Thinking, Generative AI, Data Science, Deep Learning, Business Ethics, Artificial Neural Networks, Business Transformation
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, ISO/IEC 27001, Risk Management Framework, Information Assurance, Security Controls, Incident Response
Searches related to security strategy
In summary, here are 10 of our most popular security strategy courses
- The Bits and Bytes of Computer Networking:Â Google
- Google IT Support:Â Google
- Hardware Security:Â University of Maryland, College Park
- Managing Network Security:Â Kennesaw State University
- Successful Negotiation: Essential Strategies and Skills:Â University of Michigan
- Operating Systems: Overview, Administration, and Security:Â IBM
- Business Foundations:Â University of Pennsylvania
- Sound the Alarm: Detection and Response:Â Google
- IBM Back-End Development:Â IBM
- AI For Everyone:Â DeepLearning.AI