Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security strategy"
- Status: Free Trial
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Data Security, Cryptographic Protocols, Windows Servers, Advanced Encryption Standard (AES), Cyber Attacks, Secure Coding, Data Encryption Standard, Microsoft Windows, Information Technology, Cyber Security Strategy, Security Requirements Analysis, Computer Security Incident Management
- Status: Preview
Erasmus University Rotterdam
Skills you'll gain: Security Management, Intelligence Collection and Analysis, International Relations, Public Safety and National Security, Safety and Security, Risk Management, Cybersecurity, Governance, Cultural Diversity, Economics, Policy, and Social Studies
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Cyber Governance, Security Management, NIST 800-53, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Legal Risk
- Status: NewStatus: Free
Skills you'll gain: Prompt Engineering, ChatGPT, Open Web Application Security Project (OWASP), Responsible AI, Penetration Testing, Threat Modeling, Cyber Operations, Exploitation techniques, Vulnerability Scanning, Generative AI, Scripting
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Risk Management Framework, Continuous Monitoring, Security Controls, Enterprise Security, Information Privacy
- Status: Free Trial
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Firewall, Threat Modeling, Information Systems Security, Cybersecurity, Geographic Information Systems
- Status: Free Trial
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Exploit development, Cloud Security, Security Strategy, Computer Security Awareness Training, Risk Management, Enterprise Security
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Threat Detection, Human Factors (Security), Business Risk Management, Cybersecurity, Security Awareness, Enterprise Risk Management (ERM), Information Management, Computer Security Awareness Training, Mobile Security, Business Ethics, Performance Measurement, Cyber Risk
- Status: Free Trial
Skills you'll gain: Identity and Access Management, Endpoint Security, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cyber Security Strategy, Secure Coding, Firewall, Application Security, Authentications, Security Controls, Authorization (Computing), Security Information and Event Management (SIEM), Data Governance
- Status: Free Trial
University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, Enterprise Application Management, OSI Models, User Accounts, Group Policy, Security Management, Operating System Administration, Systems Administration, Virtualization, Cybersecurity
- Status: Free Trial
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Enterprise Risk Management (ERM), Business Risk Management, Security Strategy
- Status: NewStatus: Free Trial
Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, Amazon Web Services, System Configuration, Firewall, Cloud Computing Architecture, Linux Administration, Risk Management
In summary, here are 10 of our most popular security strategy courses
- Cybersecurity Fundamentals:Â IBM
- International Security Management:Â Erasmus University Rotterdam
- Homeland Security and Cybersecurity:Â University of Colorado System
- ChatGPT for Offensive Security:Â Infosec
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University
- Advanced System Security Design:Â University of Colorado System
- Cybersecurity for Business:Â University of Colorado System
- Cybersecurity: Developing a Program for Your Business:Â Kennesaw State University
- Cybersecurity Architecture:Â IBM
- Computer Security and Systems Management:Â University of Colorado System