Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity planning"
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Skills you'll gain: Cybersecurity, Technical Support and Services, Information Technology, Network Security, Cyber Security Strategy, Computer Security Awareness Training, Application Security, Security Management
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Cryptographic Protocols, Data Security, Email Security, Computer Security Awareness Training, Advanced Encryption Standard (AES), Security Awareness, Key Management, Secure Coding, Technical Support and Services, Information Technology, Cyber Security Strategy
- Status: Free
Yale University
Skills you'll gain: Investment Banking, Risk Management, Financial Market, Financial Regulation, Financial Services, Finance, Business Risk Management, Securities (Finance), Financial Policy, Capital Markets, Behavioral Economics, Banking, Corporate Finance, Governance, Insurance, Underwriting, Equities, Derivatives, Mortgage Loans, Decision Making
University of California, Irvine
Skills you'll gain: Stakeholder Management, Conflict Management, Project Management, Project Planning, Project Management Life Cycle, Project Documentation, Requirements Management, Project Scoping, Organizational Structure, Planning, Influencing
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
University of Virginia
Skills you'll gain: Project Planning, Earned Value Management, Project Risk Management, Stakeholder Management, Risk Management, Project Management, Project Scoping, Project Schedules, Stakeholder Communications, Work Breakdown Structure, Dependency Analysis, Agile Methodology, Kanban Principles
Rutgers the State University of New Jersey
Skills you'll gain: Demand Planning, Forecasting, Supply Chain Planning, Sales Management, Time Series Analysis and Forecasting, Supply Chain Management, Estimation, Trend Analysis, Decision Making
Skills you'll gain: Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Security Awareness, Cyber Threat Intelligence, Malware Protection, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Threat Modeling, Personally Identifiable Information, Malware Protection, Email Security, Incident Response
Skills you'll gain: Debugging, Cybersecurity, Programming Principles, Python Programming, Scripting, Automation, File Management, Data Structures
Skills you'll gain: ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Artificial Intelligence, Natural Language Processing, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Vulnerability Management, Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Technical Communication
Searches related to cybersecurity planning
In summary, here are 10 of our most popular cybersecurity planning courses
- Introduction to Cybersecurity Tools & Cyberattacks: IBM
- Introduction to Cybersecurity Careers: IBM
- Cybersecurity Fundamentals: IBM
- Financial Markets: Yale University
- Initiating and Planning Projects: University of California, Irvine
- IT Fundamentals for Cybersecurity: IBM
- Fundamentals of Project Planning and Management: University of Virginia
- Supply Chain Planning: Rutgers the State University of New Jersey
- Cybersecurity Attack and Defense Fundamentals: EC-Council
- Introduction to Cybersecurity Fundamentals: Coursera Instructor Network