Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security strategy"
- Status: New
Macquarie University
Skills you'll gain: Cyber Governance, Law, Regulation, and Compliance, Security Strategy, Culture Transformation, Enterprise Security, Cyber Operations, Communication, Business Risk Management, Business Leadership, Organizational Leadership, Leadership, Dashboard
- Status: New
Macquarie University
Skills you'll gain: Cyber Governance, Cyber Risk, Risk Analysis, Cyber Security Strategy, Cyber Security Assessment, Cyber Attacks, Incident Response, Cybersecurity, Cyber Security Policies, Cyber Threat Intelligence, Leadership, Risk Management, Threat Management, Leadership and Management, Governance, Compliance Management, Threat Detection, ISO/IEC 27001, Resilience, NIST 800-53
- Status: Preview
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Governance, Network Infrastructure, Conflict Management, Security Management, Political Sciences, Media and Communications, Psychology
- Status: NewStatus: Free Trial
Skills you'll gain: Computer Security Incident Management, Security Management, Data Security, Data Integrity
- Status: NewStatus: Preview
Skills you'll gain: Cyber Governance, Cyber Security Policies, Continuous Improvement Process, Business Risk Management, Governance Risk Management and Compliance, Enterprise Risk Management (ERM), Governance, Risk Management, Audit Planning, Cyber Security Strategy, Compliance Management, Cybersecurity, Key Performance Indicators (KPIs), Performance Measurement, Regulatory Compliance, Training Programs, Auditing, ISO/IEC 27001, NIST 800-53, General Data Protection Regulation (GDPR)
- Status: Free Trial
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Cyber Security Strategy, Data Encryption Standard, Threat Management, Cyber Risk, Mobile Security, Enterprise Security, Computer Security, Threat Detection, Cyber Security Policies
What brings you to Coursera today?
- Status: NewStatus: Free Trial
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Incident Response, Cyber Threat Hunting, Cybersecurity, Cyber Threat Intelligence, DevSecOps, Cloud Security, Patch Management, Cyber Security Assessment, Exploitation techniques, Network Security, Computer Security Incident Management, Business Continuity, Cryptography, Responsible AI, Threat Modeling, Information Systems Security, DevOps, Disaster Recovery
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Fraud detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Security Strategy, Threat Modeling, Email Security, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
- Status: NewStatus: Free Trial
Advancing Women in Tech
Skills you'll gain: ISO/IEC 27001, Budget Management, Cybersecurity, Cyber Governance, Cyber Security Strategy, Leadership Development, Cyber Risk, Security Management, Information Systems Security, Business Strategies, Strategic Leadership, Leadership and Management, Risk Management, Business Metrics, Vendor Management, Team Leadership, Compliance Auditing, Business Communication, Information Technology, Artificial Intelligence and Machine Learning (AI/ML)
- Status: NewStatus: Free Trial
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Threat Modeling, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, Computer Security Incident Management, Cloud Security, MITRE ATT&CK Framework, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Risk Management
- Status: Free Trial
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
- Status: NewStatus: Free Trial
Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Security Management, Cyber Threat Hunting, Information Systems Security, Threat Detection, Data Security, Network Security, Application Security, Cyber Security Strategy, DevSecOps, Malware Protection, Cloud Security, Cyber Security Assessment, Risk Management Framework, Encryption, Authentications
In summary, here are 10 of our most popular cyber security strategy courses
- Cyber Security: Essentials for Managers and Leaders: Macquarie University
- Cyber Security: GRC Part 2 - Risk Management and Compliance: Macquarie University
- International Cyber Conflicts: The State University of New York
- CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 3: Pearson
- Cybersecurity Policy & Governance for Business Success : Starweaver
- Introduction to Cyber Security: New York University
- Practical Cybersecurity Fundamentals: Pearson
- AI for Cybersecurity: Johns Hopkins University
- Real-World Cybersecurity Leadership: Advancing Women in Tech
- Cybersecurity Prevention and Detection: Pearson