Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security strategy"
Google Cloud
Skills you'll gain: Generative AI, Data Ethics, Artificial Intelligence, Google Cloud Platform, Business Ethics, Application Development, Accountability, Compliance Training, Ethical Standards And Conduct, Artificial Intelligence and Machine Learning (AI/ML), Governance, Organizational Effectiveness, Machine Learning, Project Design, Decision Making, Natural Language Processing, Machine Learning Methods, Corporate Strategy, Performance Tuning, Business Leadership
Skills you'll gain: New Product Development, Product Management, Product Lifecycle Management, Agile Software Development, Product Development, Innovation, Product Roadmaps, Agile Methodology, Kanban Principles, Product Planning, Product Strategy, Product Testing, Project Management Life Cycle, Agile Project Management, Product Marketing, User Story, Sprint Retrospectives, Stakeholder Management, Competitive Analysis, Test Planning
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Mobile Security, Cybersecurity, Cyber Threat Intelligence, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Intrusion Detection and Prevention, Encryption, Network Protocols
Skills you'll gain: OSI Models, Network Security, Security Controls, General Networking, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Proxy Servers, Distributed Denial-Of-Service (DDoS) Attacks, Network Infrastructure, Network Architecture, Identity and Access Management
Skills you'll gain: Virtualization, Disaster Recovery, Software-Defined Networking, Network Security, Computer Networking, Virtual Machines, IT Infrastructure, Firewall, Automation, Application Security, Data Centers
Skills you'll gain: ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Artificial Intelligence, Natural Language Processing, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Vulnerability Management, Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Technical Communication
Skills you'll gain: Data Storytelling, Requirements Elicitation, Business Process Modeling, Business Analysis, Data Presentation, Process Analysis, Resource Allocation, Data Visualization, Interactive Data Visualization, Stakeholder Management, Process Optimization, Business Requirements, Requirements Management, Data Modeling, Risk Analysis, Requirements Analysis, Excel Formulas, Microsoft Excel, Data Cleansing, Analysis
Skills you'll gain: Cybersecurity, Technical Support and Services, Information Technology, Network Security, Cyber Security Strategy, Computer Security Awareness Training, Application Security, Security Management
University of Illinois Urbana-Champaign
Skills you'll gain: Business Strategy, International Relations, Strategic Decision-Making, Strategic Partnership, Competitive Analysis, Mergers & Acquisitions, Business Risk Management, Policy Analysis, Cost Reduction, Market Opportunities, Operational Efficiency
Palo Alto Networks
Skills you'll gain: Network Security, Cloud Security, Cyber Operations, DevSecOps, Cybersecurity, Cloud-Native Computing, Endpoint Detection and Response, Cyber Attacks, General Networking, TCP/IP, Zero Trust Network Access, Cryptography, Endpoint Security, Cyber Threat Intelligence, Malware Protection, Cloud Platforms, Cloud Computing, Firewall, Encryption, Security Information and Event Management (SIEM)
EIT Digital
Skills you'll gain: Embedded Systems, Embedded Software, Internet Of Things, Cryptography, Operating Systems, Security Requirements Analysis, Network Architecture, Network Security, Cybersecurity, Real Time Data, Web Services, Encryption, Engineering Software, Network Protocols, Public Key Cryptography Standards (PKCS), Wireless Networks, Computer Programming, Software Engineering, C (Programming Language), System Design and Implementation
University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geospatial Information and Technology, Encryption, Data Security, Network Security, Information Systems Security, Public Key Infrastructure, Wireless Networks, Extensible Languages and XML
Searches related to security strategy
In summary, here are 10 of our most popular security strategy courses
- Introduction to Generative AI Learning Path:Â Google Cloud
- IBM Product Manager:Â IBM
- Advanced Cybersecurity Techniques:Â Johns Hopkins University
- Network and Communications Security :Â ISC2
- Networking and Security Architecture with VMware NSX:Â VMware
- IBM Generative AI for Cybersecurity Professionals:Â IBM
- IBM Business Analyst:Â IBM
- Introduction to Cybersecurity Careers:Â IBM
- Global Strategy II: Doing Business in The Global Economy:Â University of Illinois Urbana-Champaign
- Palo Alto Networks Cybersecurity:Â Palo Alto Networks