Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber-operationen"
- Status: NewStatus: Free Trial
Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, Exploit development, Intrusion Detection and Prevention, System Configuration, Virtual Machines
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Supervised Learning, Microsoft Windows
- Status: Free Trial
Infosec
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Exploit development, System Monitoring, Cybersecurity, Cyber Operations, Continuous Monitoring, Network Security, Network Monitoring, Python Programming, Scripting, Scripting Languages
- Status: Free Trial
Skills you'll gain: Threat Modeling, Cyber Operations, Threat Detection, Exploit development, Cybersecurity, Scripting, IT Automation, Command-Line Interface, Python Programming, Encryption, Network Analysis
- Status: Preview
Kennesaw State University
Skills you'll gain: Cybersecurity, Interviewing Skills, Cyber Security Strategy, Cyber Risk, Cyber Operations, Cyber Security Policies, Organizational Structure, Cyber Governance, Workforce Development, Security Management, Professional Networking, Training and Development
- Status: Free Trial
Skills you'll gain: Network Troubleshooting, Computer Security Incident Management, Incident Response, Cybersecurity, Cyber Attacks, Cyber Security Policies, Networking Hardware, Threat Detection, Technical Support, Network Security, General Networking, Computer Networking, Network Architecture, Network Administration, Network Protocols
- Status: Preview
Technical University of Munich (TUM)
Skills you'll gain: Cybersecurity, Safety and Security, Infrastructure Security, Medical Science and Research, Threat Management, Physical Science, Environmental Monitoring, Continuous Monitoring, Spatial Analysis, Risk Analysis, Physics
- Status: Free Trial
Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Scripting, Vulnerability Assessments, Scripting Languages, General Networking, Python Programming, Web Applications, Cybersecurity, Firewall, Network Security, Cyber Operations, Data Ethics, Wireless Networks
- Status: NewStatus: Free Trial
EC-Council
Skills you'll gain: Cryptography, Encryption, Systems Development Life Cycle, Human Factors (Security), Security Awareness, Cybersecurity, Cyber Attacks, Cyber Security Policies, Threat Detection, ISO/IEC 27001, Security Controls, Computer Security, Network Security, Risk Management Framework, Information Systems, General Data Protection Regulation (GDPR)
- Status: Free Trial
LearnKartS
Skills you'll gain: Malware Protection, Cybersecurity, Network Security, Intrusion Detection and Prevention, Information Systems Security, Cyber Attacks, Penetration Testing, Firewall, Threat Detection, Exploitation techniques, Internet Of Things
- Status: Preview
Skills you'll gain: Incident Response, Data Centers, DevSecOps, System Monitoring, Threat Detection, Microsoft Servers, Security Management, Payment Card Industry (PCI) Data Security Standards, Information Systems Security, Windows Servers, IT Infrastructure, Security Information and Event Management (SIEM), Security Testing, Disaster Recovery, IT Automation, Virtual Machines, Configuration Management
- Status: Free Trial
Skills you'll gain: Audit Planning, Auditing, Internal Controls, Risk Management Framework, Continuous Monitoring, Compliance Auditing, Project Coordination, Financial Controls, Quality Assurance, Information Systems Security, Cyber Security Assessment, Fraud detection, Governance, Presentations
In summary, here are 10 of our most popular cyber-operationen courses
- Ethical Hacking with Kali Linux:Â IBM
- Advanced Malware and Network Anomaly Detection:Â Johns Hopkins University
- Python for Active Defense:Â Infosec
- Python for Command-and-control, Exfiltration and Impact:Â Infosec
- Cybersecurity Job Search and Interviews: Getting Started:Â Kennesaw State University
- Dell Technologies Networking & Security Technical Support:Â Dell
- Space Safety:Â Technical University of Munich (TUM)
- The Complete Ethical Hacking Bootcamp: Beginner To Advanced:Â Packt
- Information Security Fundamentals:Â EC-Council
- System and Network Security:Â LearnKartS