Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cybersecurity strategies"
Skills you'll gain: Cybersecurity, Cloud Computing, Network Monitoring, Command-Line Interface, Cloud Services, Cloud Platforms, General Networking, Linux Commands, Linux, Windows PowerShell, Virtual Machines, Web Servers
DeepLearning.AI
Skills you'll gain: Computer Vision, Deep Learning, Image Analysis, Natural Language Processing, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Tensorflow, Supervised Learning, Keras (Neural Network Library), Artificial Intelligence, Applied Machine Learning, PyTorch (Machine Learning Library), Machine Learning, Debugging, Performance Tuning, Machine Learning Methods, Python Programming, Data-Driven Decision-Making, Text Mining, Network Architecture
Kennesaw State University
Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Cyber Threat Intelligence, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Risk Modeling
Skills you'll gain: Debugging, Cybersecurity, Programming Principles, Python Programming, Scripting, Automation, File Management, Data Structures
University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Cyber Governance, Cyber Risk, Security Strategy, Cyber Security Policies, Security Management, Security Awareness, Personally Identifiable Information, Threat Modeling, Information Privacy, Infrastructure Security, Risk Management, Vulnerability Assessments
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Law, Regulation, and Compliance, Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
Skills you'll gain: Cyber Attacks, Cybersecurity, Threat Management, Business Continuity, Threat Detection, Endpoint Security, Disaster Recovery, Cyber Security Policies, Incident Response, Vulnerability Assessments, Vulnerability Management, Network Security, Governance Risk Management and Compliance, Security Controls, Cloud Security, Risk Management
Infosec
Skills you'll gain: Cyber Risk, Risk Management Framework, NIST 800-53, Cybersecurity, Cyber Governance, Cyber Security Strategy, Risk Management, Infrastructure Security, Cyber Security Assessment, Cyber Security Policies, Incident Response, Security Controls, Vulnerability Assessments, Stakeholder Communications, Business Continuity Planning, Asset Management
Skills you'll gain: Network Security, Incident Response, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Configuration Management, Cybersecurity, Security Awareness, Security Management, Computer Security Incident Management, Cyber Attacks, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Threat Modeling, Email Security, Security Engineering, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
- Status: [object Object]
Google
Skills you'll gain: Computer Networking, Network Troubleshooting, Package and Software Management, Systems Administration, Cloud Infrastructure, IT Infrastructure, TCP/IP, Desktop Support, Network Security, Network Architecture, Computer Hardware, Encryption, Linux, Microsoft Windows, Lightweight Directory Access Protocols, Cybersecurity, Security Awareness, Technical Support, Software Installation, Help Desk Support
Searches related to cybersecurity strategies
In summary, here are 10 of our most popular cybersecurity strategies courses
- Introduction to Cybersecurity Foundations:Â Infosec
- Deep Learning:Â DeepLearning.AI
- Cybersecurity Risk Management Frameworks:Â Kennesaw State University
- Automate Cybersecurity Tasks with Python:Â Google
- A Strategic Approach to Cybersecurity:Â University of Maryland, College Park
- Cybersecurity: Developing a Program for Your Business:Â Kennesaw State University
- Office of the CISO Institute: Cybersecurity Essentials:Â Google
- NIST CSF:Â Infosec
- Certified in Cybersecurity:Â ISC2
- Connect and Protect: Networks and Network Security:Â Google