Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber-operationen"
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Safety and Security, Information Technology, Information Privacy, Computer Literacy, Software Development Tools, Data Sharing, Technology Strategies
- Status: Free Trial
Skills you'll gain: MITRE ATT&CK Framework, Network Security, Cybersecurity, Exploitation techniques, Cyber Operations, Python Programming, Data Access, Authorization (Computing), Authentications, Scripting, Network Protocols, User Accounts
- Status: Preview
Skills you'll gain: Incident Response, Data Centers, DevSecOps, System Monitoring, Threat Detection, Microsoft Servers, Security Management, Payment Card Industry (PCI) Data Security Standards, Information Systems Security, Windows Servers, IT Infrastructure, Security Information and Event Management (SIEM), Security Testing, Disaster Recovery, IT Automation, Virtual Machines, Configuration Management
Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Virtual Machines, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Command-Line Interface, Software Installation
- Status: Free Trial
Infosec
Skills you'll gain: Cyber Governance, Security Management, Information Systems Security, Cybersecurity, Governance, Cyber Security Strategy, Cyber Risk, Information Assurance, Leadership, Change Management, Business Leadership
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Configuration Management, Data Ethics, Data Integrity, Identity and Access Management
Skills you'll gain: Security Management, Vulnerability Assessments, Threat Management, IT Management, Security Strategy, Cyber Governance, Risk Management Framework, Security Controls, Cyber Risk, Security Awareness, Disaster Recovery
- Status: Free Trial
Infosec
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Exploit development, System Monitoring, Cybersecurity, Cyber Operations, Continuous Monitoring, Network Security, Network Monitoring, Python Programming, Scripting, Scripting Languages
- Status: Free Trial
Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cryptography, Cybersecurity, Risk Management Framework, Cloud Computing Architecture, Network Security, Incident Response, Cloud Security, Threat Modeling, Encryption, Cyber Security Policies, Identity and Access Management, Secure Coding, Computer Security Incident Management, Cyber Security Assessment, Vulnerability Assessments, Cyber Threat Intelligence, Information Systems Security
- Status: Free Trial
Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Microsoft Azure, Cyber Governance, System Monitoring, Identity and Access Management, Cloud Security, Enterprise Security, Data Security, Authorization (Computing), Multi-Factor Authentication, Security Management, User Accounts, Authentications
- Status: NewStatus: Free Trial
EC-Council
Skills you'll gain: Cryptography, Encryption, Systems Development Life Cycle, Human Factors (Security), Security Awareness, Cybersecurity, Cyber Attacks, Cyber Security Policies, Threat Detection, ISO/IEC 27001, Security Controls, Computer Security, Network Security, Risk Management Framework, Information Systems, General Data Protection Regulation (GDPR)
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Information Systems Security, Software Installation, Virtual Machines
In summary, here are 10 of our most popular cyber-operationen courses
- Data, Security, and Privacy:Â University of California, Irvine
- Credential Access, discovery, lateral movement & collection:Â Infosec
- Data Center Security Management with Microsoft System Center:Â EDUCBA
- Pentesting Fundamentals for Beginners:Â Packt
- Leadership:Â Infosec
- Security Concepts and Practices:Â ISC2
- Certified Information Security Manager (CISM):Â Packt
- Python for Active Defense:Â Infosec
- CompTIA Security+ SY0-701 Full Training Guide:Â Packt
- Identity Protection and Governance : Microsoft