Security Strategy

Security Strategy is a structured approach to managing security risks in an organization, focusing on preventing, detecting, and responding to any potential threats. Coursera's security strategy catalogue provides you with comprehensive knowledge on how to design and implement effective security plans. You'll learn about risk assessment, security policies and procedures, physical and digital security measures, incident response planning, and the role of security governance. This skill will equip you to tackle security challenges in various sectors, including IT, finance, and public administration, helping to safeguard any organization's assets and interests.
23credentials
1online degree
94courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "security strategy"

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Cyber Governance, Security Management, NIST 800-53, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Legal Risk

  • Skills you'll gain: Security Management, Vulnerability Assessments, Threat Management, IT Management, Security Strategy, Cyber Governance, Risk Management Framework, Security Controls, Cyber Risk, Security Awareness, Disaster Recovery

  • Status: New
    Status: Free Trial

    Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Data Governance, Data Encryption Standard, Security Management, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53

  • Status: Free Trial

    Skills you'll gain: Azure Active Directory, Data Security, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Cloud Security, Active Directory, Threat Modeling, Security Strategy, Data Storage, Application Security, Database Architecture and Administration, Virtual Machines, Infrastructure Security, Kubernetes, Continuous Monitoring, Web Applications, Cyber Governance, System Monitoring, Network Security

  • Status: Free Trial

    Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework

  • Status: Preview

    Skills you'll gain: International Relations, Diplomacy, Political Sciences, Public Policies, World History, Policy Analysis, Case Studies, Economics, Governance, Security Strategy

  • Status: New
    Status: Free Trial

    Skills you'll gain: Responsible AI, Incident Response, Application Security, Security Engineering, Threat Modeling, Cybersecurity, MLOps (Machine Learning Operations), Security Controls, Information Systems Security, Artificial Intelligence and Machine Learning (AI/ML), Security Strategy, Continuous Monitoring, Identity and Access Management, Cloud Security, Vulnerability Assessments, Hardening, Threat Detection, Artificial Intelligence, Penetration Testing, Machine Learning

  • Status: Free Trial

    Skills you'll gain: Cloud Computing Architecture, Cloud Security, Cloud Computing, Zero Trust Network Access, Business Continuity, Continuous Monitoring, Cloud Infrastructure, Hybrid Cloud Computing, Cloud Platforms, Cloud Services, Data Migration, Resource Allocation, Security Requirements Analysis, Data Management, Public Cloud, Disaster Recovery, Infrastructure As A Service (IaaS), Risk Mitigation, Virtualization, Security Strategy

  • Status: New
    Status: Preview

    Skills you'll gain: Threat Detection, Threat Management, Vulnerability Management, Cloud Security, Vulnerability Assessments, Security Strategy, Multi-Cloud, Google Cloud Platform, Enterprise Security, Security Information and Event Management (SIEM), Security Controls, Risk Management Framework

  • Status: Free Trial

    Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Enterprise Risk Management (ERM), Business Risk Management, Security Strategy

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography

  • Status: New
    Status: Free Trial

    Macquarie University

    Skills you'll gain: Security Awareness, Cyber Attacks, Cyber Risk, Mobile Security, Cybersecurity, Cyber Security Strategy, Cyber Governance, Malware Protection, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Data Security, Cyber Threat Hunting, Human Factors (Security), Email Security, Identity and Access Management, Security Management, Security Strategy, Multi-Factor Authentication, Cloud Security