Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security strategy"
Skills you'll gain: Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Security Awareness, Cyber Threat Intelligence, Malware Protection, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Cyber Security Policies, Cyber Risk, Safety Audits, Threat Detection, Compliance Auditing
Skills you'll gain: Cloud Infrastructure, Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Infrastructure As A Service (IaaS), Network Monitoring, Cloud Applications, Cloud Computing Architecture, Network Architecture, Role-Based Access Control (RBAC), Network Security, Cloud Computing, Network Routing, Cloud Security, Virtual Private Networks (VPN)
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Cyber Governance, Cyber Risk, Security Strategy, Cyber Security Policies, Security Management, Security Awareness, Personally Identifiable Information, Threat Modeling, Information Privacy, Infrastructure Security, Risk Management, Vulnerability Assessments
Skills you'll gain: Cloud Infrastructure, Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Load Balancing, System Monitoring, Infrastructure As A Service (IaaS), Network Performance Management, Network Monitoring, Cloud Applications, Kubernetes, Cloud Computing Architecture, Identity and Access Management, Network Architecture, Network Security, Cloud Computing, Cloud Management, Network Routing, Virtual Private Networks (VPN), Network Troubleshooting
University of Virginia
Skills you'll gain: Growth Strategies, Business Strategy, Strategic Thinking, Plan Execution, Business Strategies, Mergers & Acquisitions, Competitive Analysis, Organizational Strategy, Strategic Planning, Business Ethics, Peer Review, Data-Driven Decision-Making, Business Planning, Corporate Strategy, Strategic Leadership, Strategic Decision-Making, Game Theory, Governance, Business Research, Project Management
Kennesaw State University
Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Cyber Threat Intelligence, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Risk Modeling
Skills you'll gain: CI/CD, Open Web Application Security Project (OWASP), Istio, Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Jenkins, Bash (Scripting Language), Cloud Services, DevOps, Git (Version Control System), Jupyter, Grafana
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Cyber Risk, Threat Detection, Security Controls, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
- Status: Free
The University of Sydney
Skills you'll gain: Design Thinking, Innovation, New Product Development, Business Modeling, Product Design, Service Design, Product Development, Business Strategy, Business Strategies, Market Research, Corporate Strategy, User Research, User Feedback, Persona Development, Product Testing, Customer Insights
Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Data Security, Cyber Risk, Emerging Technologies, Business Technologies, Identity and Access Management, Business
Searches related to security strategy
In summary, here are 10 of our most popular security strategy courses
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- Play It Safe: Manage Security Risks:Â Google
- Preparing for Google Cloud Certification: Cloud Security Engineer:Â Google Cloud
- Security Concepts and Practices:Â ISC2
- A Strategic Approach to Cybersecurity:Â University of Maryland, College Park
- Preparing for Google Cloud Certification: Cloud Network Engineer:Â Google Cloud
- Business Strategy:Â University of Virginia
- Cybersecurity Risk Management Frameworks:Â Kennesaw State University
- IBM DevOps and Software Engineering:Â IBM
- The Foundations of Cybersecurity:Â Kennesaw State University