Filter by
The language used throughout the course, in both instruction and assessments.
130 results for "cybersecurity planning"
Kennesaw State University
Skills you'll gain: Leadership and Management, Risk Management, Security Strategy, Strategy, Strategy and Operations, System Security, Security Engineering, Computer Security Incident Management, Organizational Development, Project Management
Skills you'll gain: Cloud Computing, Data Management
- Status: Free
Lund University
Skills you'll gain: Leadership and Management, Strategy, Algorithms, Human Computer Interaction, Human Resources, Machine Learning, Machine Learning Algorithms, Business Process Management, Human Learning, Machine Learning Software, Artificial Neural Networks, Training
Skills you'll gain: Risk Management
Kennesaw State University
Skills you'll gain: Computer Security Incident Management, Leadership and Management, Planning, Risk Management, Security Engineering, Strategy and Operations, System Security, Business Analysis, Operations Management, Computer Security Models
Multiple educators
Skills you'll gain: Computer Security Incident Management, Risk Management, Cloud Computing, System Security, Cloud Storage, Computer Networking, Operating Systems, Leadership and Management, Network Security, Cloud Applications, Network Architecture, Networking Hardware, Cloud Infrastructure, Cloud Platforms, Computer Programming, Cyberattacks, Databases, Security Engineering, Cryptography, DevOps, IBM Cloud, Operations Management, Software Engineering
Google Cloud
Skills you'll gain: Cloud Computing, Network Analysis
University of California, Irvine
Skills you'll gain: Leadership and Management
Kennesaw State University
Skills you'll gain: Leadership and Management
University of Maryland Global Campus
Kennesaw State University
Skills you'll gain: Leadership and Management, Risk Management
In summary, here are 10 of our most popular cybersecurity planning courses
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University
- Cybersecurity Management and Compliance:Â Microsoft
- AI, Business & the Future of Work:Â Lund University
- Security Principles:Â ISC2
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Managing Cybersecurity Incidents and Disasters:Â Kennesaw State University
- IBM and ISC2 Cybersecurity Specialist:Â IBM
- Google Cloud Cybersecurity:Â Google Cloud
- Security Governance & Compliance:Â University of California, Irvine
- Cybersecurity Job Search and Interviews: Getting Started:Â Kennesaw State University