Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security strategy"

Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Encryption
Status: NewStatus: Free TrialIllinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, Amazon Web Services, System Configuration, Firewall, Cloud Computing Architecture, Linux Administration, Risk Management
Status: NewStatus: Free TrialAdvancing Women in Tech
Skills you'll gain: ISO/IEC 27001, Budget Management, Cybersecurity, Cyber Governance, Cyber Security Strategy, Leadership Development, Cyber Risk, Security Management, Information Systems Security, Business Strategies, Strategic Leadership, Leadership and Management, Risk Management, Business Metrics, Vendor Management, Team Leadership, Compliance Auditing, Business Communication, Information Technology, Artificial Intelligence and Machine Learning (AI/ML)
Status: Free TrialUniversity of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Supplier Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Human Factors (Security), Asset Protection, Due Diligence, Training Programs
Status: Free TrialInfosec
Skills you'll gain: Cyber Governance, Security Management, Incident Management, Cyber Security Strategy, Business Continuity, Disaster Recovery, Security Controls, Asset Management, Security Requirements Analysis, Risk Management, Resource Management, Compliance Auditing, Performance Metric

Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Configuration Management, Data Ethics, Data Integrity, Identity and Access Management
Status: Free TrialJohns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security
Status: NewStatus: Free TrialSkills you'll gain: DevSecOps, Cloud Security, Patch Management, Cyber Security Assessment, Cloud Computing, Application Security, Internet Of Things, Infrastructure Security, Vulnerability Assessments, Cloud Services, Continuous Monitoring
Status: Free TrialKennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Vulnerability Assessments, Cyber Security Strategy, Network Security, Cyber Risk, Threat Detection, Security Controls, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
Status: NewStatus: Free TrialSkills you'll gain: Responsible AI, Threat Modeling, Information Systems Security, Security Engineering, Cybersecurity, Information Assurance, Threat Detection, Data Ethics, Artificial Intelligence, Generative AI, Information Privacy, Data Integrity, Data Governance
Status: Free TrialSkills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Identity and Access Management, Network Security, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Scenario Testing, Virtual Machines, Encryption, Event Management
Status: NewStatus: Free TrialSkills you'll gain: Cybersecurity, Cyber Threat Intelligence, Network Security, Cyber Security Strategy, Data Security, Security Controls, Continuous Monitoring, Threat Management, Security Strategy, Incident Response, Vulnerability Assessments, Systems Architecture, Risk Management Framework
In summary, here are 10 of our most popular security strategy courses
- Systems and Application Security:Â ISC2
- Security: A Comprehensive Approach:Â Illinois Tech
- Real-World Cybersecurity Leadership:Â Advancing Women in Tech
- Personnel & Third-Party Security:Â University of California, Irvine
- Governance and Strategy:Â Infosec
- Security Concepts and Practices:Â ISC2
- Information Assurance Analysis:Â Johns Hopkins University
- Practical Cybersecurity Fundamentals: Unit 4:Â Pearson
- The Foundations of Cybersecurity:Â Kennesaw State University
- Practical Cybersecurity Fundamentals: Unit 5:Â Pearson










