Cyber Security Policies

Cyber Security Policies are guidelines and procedures designed to protect and safeguard digital information from threats, attacks, or unauthorized access. Coursera's Cyber Security Policies catalogue equips you with the knowledge to develop, implement, and manage these policies effectively across various systems and networks. You'll learn about the different types of cyber threats, principles of secure system design, and the legal and ethical aspects of cyber security. You'll also gain skills in conducting vulnerability assessments, formulating incident response strategies, and using tools for encryption, intrusion detection, and prevention. The knowledge gained will empower you to protect digital assets, ensure privacy, and maintain the integrity of information systems.
20credentials
1online degree
80courses

Most popular

Trending now

New releases

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "cyber security policies"

  • Status: Free Trial

    Royal Holloway, University of London

    Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, Cybersecurity, ISO/IEC 27001, Cyber Risk, Security Strategy, Risk Management Framework, Human Factors

  • Status: New
    Status: Free Trial

    Skills you'll gain: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Authentications, Risk Analysis, Network Security, Cyber Governance, Cloud Computing, Compliance Auditing, Cyber Risk, Cyber Security Policies, Network Architecture, Governance, Information Systems Security, Data Security, Infrastructure Security, Mobile Security, Encryption, Risk Management

  • Status: New
    Status: Free Trial

    Skills you'll gain: Kubernetes, Cloud Security, Network Security, Infrastructure Security, Application Security, Role-Based Access Control (RBAC), Cyber Security Policies, Verification And Validation, Encryption, Configuration Management

  • Status: New
    Status: Free Trial

    Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Cyber Security Policies, Intrusion Detection and Prevention, Threat Detection, Disaster Recovery, Cybersecurity, Cyber Risk, Cyber Security Assessment, Crisis Management, Threat Management, Business Continuity, Safety and Security, Security Software, Strategic Communication, Regulation and Legal Compliance

  • Status: New
    Status: Free Trial

    Skills you'll gain: Security Management, Security Strategy, Configuration Management, Security Controls, Information Systems Security, Computer Security Awareness Training, Enterprise Security, Change Control, Safety and Security, Cyber Security Policies, Data Ethics

  • Status: Free Trial

    Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Cryptography, Data Integrity

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Cybersecurity, Information Systems Security Assessment Framework (ISSAF), Cyber Security Strategy, Vulnerability Assessments, Cyber Threat Intelligence, Threat Modeling, Exploitation techniques, Cyber Security Policies, Computer Security, Security Controls, Data Security

  • University of Maryland, College Park

    Skills you'll gain: Cybersecurity, Cyber Security Strategy, Cyber Governance, Cyber Risk, Cyber Security Assessment, Security Strategy, Cyber Security Policies, Security Management, Security Awareness, Threat Modeling, Information Privacy, Infrastructure Security, Risk Management, Vulnerability Assessments

  • Status: Free Trial

    Skills you'll gain: Infrastructure Security, Cyber Risk, Cyber Security Policies, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Risk Management Framework, Technology Roadmaps, Network Infrastructure, Transportation Operations, Infrastructure Architecture, Mobile Security

  • Status: Free Trial

    Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management

  • Status: Free Trial

    University of California, Irvine

    Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security

  • Status: New

    University of Maryland, College Park

    Skills you'll gain: Cybersecurity, Cyber Security Policies, Cyber Risk, Risk Management, Cyber Governance, Cyber Attacks, Stakeholder Engagement, Risk Mitigation, Cyber Security Strategy, Stakeholder Communications, Operational Risk, Enterprise Risk Management (ERM), Security Management, Risk Analysis, Cyber Security Assessment, Threat Modeling, Information Assurance, Risk Modeling, Governance, Vulnerability Assessments

What brings you to Coursera today?

Leading partners

  • Packt
  • Kennesaw State University
  • Macquarie University
  • Infosec
  • University of Colorado System
  • LearnQuest
  • Pearson
  • ISC2