Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber-operationen"
- Status: Free Trial
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Endpoint Detection and Response, Data Security, Cryptographic Protocols, Windows Servers, Advanced Encryption Standard (AES), Cyber Attacks, Secure Coding, Microsoft Windows, Information Technology, Cyber Security Strategy, Cyber Security Policies, Computer Security Incident Management
- Status: NewStatus: Free Trial
University of Colorado Boulder
Skills you'll gain: Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Personally Identifiable Information, Business Logic
- Status: Free Trial
Skills you'll gain: Cybersecurity, Information Technology, Cyber Security Strategy, Cyber Security Policies, Technical Support and Services, Technical Support, Computer Security Awareness Training, Security Awareness, Network Security, Data Security, Information Assurance, General Networking, Operating Systems, Computer Hardware
- Status: NewStatus: Free Trial
Advancing Women in Tech
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Business Priorities, Enterprise Security, Security Awareness, Security Management, Regulatory Compliance, Compliance Management, Risk Management, Communication
- Status: NewStatus: Preview
Skills you'll gain: Penetration Testing, Metasploit, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cyber Security Assessment, Cyber Threat Intelligence, Generative AI, Cyber Operations, Data Ethics, Prompt Engineering, Automation
- Status: Free Trial
Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Exploit development, Cybersecurity, Network Security, System Monitoring, Cyber Operations, Continuous Monitoring, Cyber Threat Intelligence, Exploitation techniques, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Persistence, Python Programming, Data Access, Computer Programming
- Status: New
Skills you'll gain: Threat Modeling, Threat Detection, MITRE ATT&CK Framework, Security Testing, Application Security, Security Engineering, Cyber Security Strategy, Cybersecurity, Cyber Security Assessment, Vulnerability Assessments, DevSecOps, Risk Management Framework, Open Web Application Security Project (OWASP), Software Development Life Cycle, Cloud Security
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Network Security, Network Analysis, Network Protocols, Open Source Technology
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
- Status: NewStatus: Free Trial
Skills you'll gain: Governance, Governance Risk Management and Compliance, Enterprise Security, Compliance Management, Regulatory Requirements, Business Metrics, Performance Metric, Ethical Standards And Conduct
- Status: Preview
Stanford University
Skills you'll gain: Physics, Timelines, Verification And Validation, Scientific Methods, Research, Mechanics, Mathematical Modeling, Systems Of Measurement
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques
In summary, here are 10 of our most popular cyber-operationen courses
- Cybersecurity Fundamentals: IBM
- Security & Ethical Hacking: Attacking Web and AI Systems: University of Colorado Boulder
- Introduction to Cybersecurity Careers: IBM
- The Cybersecurity Career Ladder: Advancing Women in Tech
- Generative AI for Penetration Testing: Red Team: LearnQuest
- Python for Cybersecurity: Infosec
- Modelling Threats - Strategies in Threat Modelling: Packt
- Certified Ethical Hacker (CEH): Unit 2: Pearson
- Sound the Alarm: Detection and Response: Google
- The Pearson Complete Course for CISM Certification: Unit 1: Pearson