Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cybersecurity strategies"
Skills you'll gain: Identity and Access Management, Endpoint Security, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cyber Security Strategy, Secure Coding, Firewall, Application Security, Authentications, Security Controls, Authorization (Computing), Security Information and Event Management (SIEM), Data Governance, Incident Response
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Crisis Management, Incident Response, OpenAI, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Threat Management, Artificial Intelligence and Machine Learning (AI/ML), Expense Management, Threat Modeling, Creative Thinking, Creative Problem-Solving
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Threat Management, Malware Protection, Healthcare Industry Knowledge, Encryption, Data Security, Information Privacy, General Data Protection Regulation (GDPR), Digital Communications
University of Michigan
Skills you'll gain: Negotiation, Contract Negotiation, Conflict Management, Communication, Contract Management, Influencing, Planning, Decision Making, Ethical Standards And Conduct, Industrial and Organizational Psychology
Kennesaw State University
Skills you'll gain: Network Security, Incident Response, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Computer Security Incident Management, Cyber Security Policies, Security Management, Firewall, Network Monitoring, Cyber Security Strategy, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Cyber Risk, Network Protocols, Risk Management
Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, NIST 800-53, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR), Business Ethics
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Threat Intelligence, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Governance, Continuous Monitoring, Security Management, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Infrastructure Architecture
Skills you'll gain: Public Key Infrastructure, Identity and Access Management, Encryption, Endpoint Security, Network Security, Cybersecurity, Cryptography, Threat Detection, Cyber Attacks, Data Security, Email Security, Computer Security Awareness Training, Data Encryption Standard, Security Awareness, Secure Coding, Advanced Encryption Standard (AES), Information Systems Security, Technical Support and Services, Information Technology, Cyber Security Strategy
Edureka
Skills you'll gain: Incident Management, Cybersecurity, Intrusion Detection and Prevention, Infrastructure Security, Cyber Attacks, Threat Modeling, Incident Response, Security Controls, Threat Detection, Network Security, Network Architecture, Network Protocols
Skills you'll gain: Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Security Awareness, Cyber Threat Intelligence, Malware Protection, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training
Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Cloud Services, Cloud Platforms, General Networking, Windows PowerShell, Cyber Governance, Unix Commands, Cyber Security Strategy
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Searches related to cybersecurity strategies
In summary, here are 10 of our most popular cybersecurity strategies courses
- Cybersecurity Architecture:Â IBM
- Generative AI Cybersecurity & Privacy for Leaders:Â Vanderbilt University
- Cybersecurity in Healthcare (Hospitals & Care Centres):Â Erasmus University Rotterdam
- Successful Negotiation: Essential Strategies and Skills:Â University of Michigan
- Managing Cybersecurity:Â Kennesaw State University
- Cybersecurity Compliance Framework, Standards & Regulations:Â IBM
- Homeland Security and Cybersecurity:Â University of Colorado System
- Cybersecurity Fundamentals:Â IBM
- Industrial Cybersecurity:Â Edureka
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council