Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security strategy"
University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Encryption, Vulnerability Assessments, Key Management, Public Key Cryptography Standards (PKCS), Authentications, Mobile Security, Data Integrity
Northeastern University
Skills you'll gain: Software Development Life Cycle, Agile Software Development, Agile Methodology, Requirements Analysis, Agile Project Management, Software Development Methodologies, Application Lifecycle Management, Interpersonal Communications, Scrum (Software Development), Sprint Retrospectives, User Story, Waterfall Methodology, Sprint Planning, Quality Management, Continuous Improvement Process
- Status: Free Trial
Fractal Analytics
Skills you'll gain: Prompt Engineering, Generative AI, Business Consulting, Leadership, Management Consulting, Customer Insights, Data Ethics, Business Process Automation, Automation, Solution Design, Ethical Standards And Conduct
- Status: Free
Sciences Po
Skills you'll gain: Social Studies, Economic Development, Social Sciences, Socioeconomics, Safety and Security, Culture, Environmental Issue, Demography, Community Development, Sociology, Cultural Diversity, Policty Analysis, Research, and Development, Education and Training, European History, Public Policies, Governance
- Status: Free Trial
LearnKartS
Skills you'll gain: Conflict Management, Project Management, Project Planning, Performance Analysis, Negotiation, Estimation, Project Coordination, Change Management, Stakeholder Engagement, Events and Conferences, Meeting Facilitation, Analysis
Packt
Skills you'll gain: Identity and Access Management, Application Security, Secure Coding, Security Testing, Information Systems Security, Cyber Security Assessment, Security Engineering, Security Controls, Risk Management Framework, Cybersecurity, Authentications, Threat Modeling, Network Security, Infrastructure Security, Data Security, Continuous Monitoring, Software Development Life Cycle, Authorization (Computing), Vulnerability Assessments, Cryptography
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications
- Status: Free Trial
Skills you'll gain: Network Troubleshooting, Network Routing, Routing Protocols, Network Routers, OSI Models, TCP/IP, Virtual Local Area Network (VLAN), Network Switches, Networking Hardware, Network Administration, Local Area Networks, Network Infrastructure, Network Protocols, System Configuration, Configuration Management
- Status: Free Trial
University of Illinois Urbana-Champaign
Skills you'll gain: Market Dynamics, Business Economics, Business, Economics, Business Operations, Supply And Demand, Price Negotiation, Business Strategy, Market Analysis, Market Research, Competitive Analysis, Consumer Behaviour, Revenue Management, Production Process, Decision Making
- Status: Free Trial
University of Houston
Skills you'll gain: Medical Management, Preventative Care, Care Management, Practice Management, Public Health and Disease Prevention, Interoperability, Primary Care, Health Informatics, Care Coordination, Patient Coordination, Chronic Diseases, Health Care, Electronic Medical Record, Data Management
- Status: Free Trial
Amazon
Skills you'll gain: Git (Version Control System), Software Development Methodologies, Requirements Analysis, Version Control, Application Development, Software Development Life Cycle, Systems Development, Software Development, Unified Modeling Language, Software Testing, JUnit, Agile Methodology, Spring Framework, Code Review, Maintainability, Debugging, Java, Technical Design, User Story, User Interface (UI) Design
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Internet Of Things, Cloud Computing Architecture, Amazon Web Services, Application Security, Application Programming Interface (API), Microservices, Embedded Systems, Cloud Services, Network Protocols, Cloud Technologies, Cybersecurity, Serial Peripheral Interface, Wireless Networks, Wide Area Networks
Searches related to security strategy
In summary, here are 10 of our most popular security strategy courses
- Introduction to Applied Cryptography:Â University of London
- Agile Dev Practices: SDLC & Project Management:Â Northeastern University
- Generative AI for Consultants:Â Fractal Analytics
- A la recherche du Grand Paris:Â Sciences Po
- Models, Methods, and Artifacts:Â LearnKartS
- CISSP Crash Course:Â Packt
- Cryptographic Hash and Integrity Protection:Â University of Colorado System
- CCNA Intermediate – Switching, VLANs & Routing: Packt
- The Theory of the Firm:Â University of Illinois Urbana-Champaign
- Value-Based Care: Managing Processes to Improve Outcomes:Â University of Houston