Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security strategy"
Skills you'll gain: Data Storytelling, Performance Measurement, Data-Driven Decision-Making, E-Commerce, Digital Marketing, Branding, Marketing Channel, Marketing Strategy and Techniques, Customer Analysis, Advertising, Marketing Analytics, Search Engine Marketing, Customer Engagement, Content Marketing, Brand Awareness, Search Engine Optimization, Social Media Marketing, Target Audience
University of Pennsylvania
Skills you'll gain: Operations Management, Return On Investment, Operational Efficiency, Financial Statements, Financial Statement Analysis, Finance, Human Capital, Go To Market Strategy, Process Analysis, Branding, People Management, Financial Reporting, Capital Budgeting, Financial Accounting, Operational Performance Management, Consumer Behaviour, Leadership and Management, Marketing Planning, Peer Review, Analysis
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
Skills you'll gain: CI/CD, Open Web Application Security Project (OWASP), Istio, Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Jenkins, Bash (Scripting Language), Cloud Services, Git (Version Control System), DevOps, Jupyter, Grafana
Skills you'll gain: Open Web Application Security Project (OWASP), Istio, Software Development Life Cycle, Linux Commands, Unit Testing, Object-Relational Mapping, Application Deployment, Kubernetes, NoSQL, Bash (Scripting Language), MongoDB, Shell Script, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Serverless Computing, Jupyter, Grafana
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Law, Regulation, and Compliance, Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
IE Business School
Skills you'll gain: Survey Creation, Marketing Planning, Market Research, Business Research, Product Marketing, Consumer Behaviour, Value Propositions, Market Analysis, Marketing, Business Planning, Marketing Channel, Peer Review, Product Strategy, Target Market, Research Design, Data Analysis, Marketing Strategy and Techniques, Marketing Communications, Strategic Marketing, Marketing Management
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Akamai Technologies, Inc.
Skills you'll gain: Computer Security Incident Management, Mobile Security, Network Security, Risk Management
Skills you'll gain: Cyber Governance, Security Strategy, Security Management, Incident Management, Cyber Security Strategy, Business Continuity Planning, IT Security Architecture, Computer Security Incident Management, Business Continuity, Cyber Security Policies, Disaster Recovery, IT Management, Cybersecurity, Contingency Planning, Governance, Cyber Risk, Asset Management, Cyber Security Assessment, Information Assurance, Risk Analysis
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cryptographic Protocols, Email Security, Computer Security Awareness Training, Advanced Encryption Standard (AES), Security Awareness, Key Management, Secure Coding, Technical Support and Services, Information Technology, Cyber Security Strategy
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Searches related to security strategy
In summary, here are 10 of our most popular security strategy courses
- Foundations of Digital Marketing and E-commerce:Â Google
- Business Foundations:Â University of Pennsylvania
- Sound the Alarm: Detection and Response:Â Google
- IBM DevOps and Software Engineering:Â IBM
- IBM Back-End Development:Â IBM
- Cybersecurity: Developing a Program for Your Business:Â Kennesaw State University
- Marketing Strategy:Â IE Business School
- IT Fundamentals for Cybersecurity:Â IBM
- Introduction to IT Security:Â Akamai Technologies, Inc.
- Cybersecurity Leadership and Management:Â Infosec