Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber-operationen"
- Status: Free Trial
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption
- Status: NewStatus: Free Trial
Skills you'll gain: Security Management, Security Strategy, Configuration Management, Security Controls, Information Systems Security, Computer Security Awareness Training, Enterprise Security, Change Control, Safety and Security, Cyber Security Policies, Data Ethics
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Malware Protection, Cyber Security Assessment, Threat Detection, Penetration Testing, Threat Management, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
- Status: Preview
Edureka
Skills you'll gain: Cyber Security Assessment, Malware Protection, Automation, Human Machine Interfaces
- Status: NewStatus: Free Trial
Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Vulnerability Assessments, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Network Troubleshooting, Anomaly Detection, Cyber Attacks, Computer Security, Network Analysis
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security
- Status: Free Trial
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Incident Response, Intrusion Detection and Prevention, Business Risk Management, Network Security, Vulnerability Assessments, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Computer Security Incident Management, Event Monitoring, Network Architecture, Security Controls, Cyber Risk, Linux, Cybersecurity, Debugging, SQL
- Status: NewStatus: Free Trial
Skills you'll gain: Cyber Attacks, Computer Security
- Status: Free Trial
University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, World History, Risk Management Framework
- Status: Free Trial
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, Firewall, Cyber Threat Intelligence, Endpoint Security, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications, Artificial Intelligence
- Status: Preview
University of London
Skills you'll gain: Law, Regulation, and Compliance, Business Ethics, Social Justice, Environmental Social And Corporate Governance (ESG), Legal Proceedings, International Relations, Legal Research, Political Sciences, Governance, Corporate Sustainability
- Status: Free Trial
LearnKartS
Skills you'll gain: Penetration Testing, Cybersecurity, Security Testing, Cyber Security Assessment, Vulnerability Assessments, Network Security, Information Systems Security, Exploitation techniques, Malware Protection, Web Servers, Web Applications, Security Awareness, Network Analysis
In summary, here are 10 of our most popular cyber-operationen courses
- Network Security:Â ISC2
- (SSCP) Systems Security Certified Practitioner: Unit 1:Â Pearson
- Certified Ethical Hacker (CEH): Unit 3:Â Pearson
- Industrial Cybersecurity:Â Edureka
- IBM Ethical Hacking with Open Source Tools:Â IBM
- Security Governance & Compliance:Â University of California, Irvine
- Ciberseguridad de Google:Â Google
- Introduction to Ethical Hacking Principles:Â SkillUp
- Homeland Security & Cybersecurity Connection - It's Not About the Terrorists:Â University of Colorado System
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks