Filter by
The language used throughout the course, in both instruction and assessments.
Results for "data+breach+handling"
Skills you'll gain: Computer Security Incident Management, Cyberattacks
Skills you'll gain: DevOps, Mobile Security, Software Security, System Software, Cyberattacks, Leadership and Management
University of Pennsylvania
Skills you'll gain: Data Management, Risk Management
Skills you'll gain: Linux, Network Security, Computer Security Incident Management, Leadership and Management
Skills you'll gain: Cryptography, Risk Management
Skills you'll gain: Security Strategy, Computer Security Incident Management, Python Programming, Computer Programming, Cryptography
- Status: Free
Campus BBVA
Skills you'll gain: Cyberattacks, System Security, System Software, Computer Security Models, Network Security, Software Security, Computer Security Incident Management, Mobile Security
Kennesaw State University
Skills you'll gain: Security Engineering, System Security, Risk Management, Computer Security Incident Management, Leadership and Management, Security Strategy, Network Security, Strategy, Cyberattacks, Strategy and Operations, Computer Security Models, Software Security, Security Software, Computer Networking, Planning, Regulations and Compliance, Business Analysis, Network Architecture, Operating Systems, Networking Hardware, Operations Management, Cryptography, Network Model, Systems Design
Kennesaw State University
Skills you'll gain: Leadership and Management, Risk Management, Security Strategy, Strategy, Strategy and Operations, System Security, Security Engineering, Computer Security Incident Management, Regulations and Compliance, Systems Design
- Status: Free
Northeastern University
Skills you'll gain: Security Engineering
Johns Hopkins University
University of California, Irvine
Skills you'll gain: Leadership and Management, Risk Management, Strategy
In summary, here are 10 of our most popular data+breach+handling courses
- Cybersecurity Capstone: Breach Response Case Studies:Â IBM
- Incident Response and Digital Forensics:Â IBM
- Privacy Law and Data Protection:Â University of Pennsylvania
- Sound the Alarm: Detection and Response:Â Google
- Cybersecurity Compliance Framework, Standards & Regulations:Â IBM
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Data & Cybersecurity:Â Campus BBVA
- Managing Cybersecurity:Â Kennesaw State University
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University
- Data Privacy Fundamentals:Â Northeastern University