Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber-operationen"
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software)
- Status: NewStatus: Free Trial
Real Madrid Graduate School Universidad Europea
Skills you'll gain: Artificial Intelligence, Performance Analysis, Automation, Personalized Service, Digital Transformation, Augmented and Virtual Reality (AR/VR), Technology Strategies, Innovation, Internet Of Things, Machine Learning, Big Data, Ethical Standards And Conduct, Deep Learning, Analytical Skills, Predictive Analytics, Health Technology, Data Analysis, Natural Language Processing, User Experience, Data Security
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cost Benefit Analysis, Risk Management Framework, Risk Management, Risk Analysis, Cyber Risk, ISO/IEC 27001, Enterprise Risk Management (ERM), NIST 800-53, Business Risk Management, Risk Mitigation, Governance Risk Management and Compliance, Cybersecurity, Security Controls
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Supplier Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Human Factors (Security), Asset Protection, Due Diligence, Training Programs
- Status: NewStatus: Free Trial
Skills you'll gain: Threat Detection, Cyber Threat Intelligence, Threat Management, Vulnerability Assessments, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Cybersecurity, Security Strategy, Risk Mitigation, Emergency Response, System Configuration, Software Installation, Network Analysis, Technical Writing
- Status: Free Trial
Skills you'll gain: Cyber Operations, Cybersecurity, Authentications, Python Programming, Data Access, Network Security, System Monitoring, Network Protocols
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Data Security, Cybersecurity, Cyber Attacks, Data Ethics, Authentications, Authorization (Computing), Cryptography, Human Factors (Security), Security Controls, Security Awareness, Information Privacy, Threat Modeling, Computer Security Incident Management, Risk Analysis, Technical Communication, Problem Solving, Communication
- Status: Preview
Coursera Instructor Network
Skills you'll gain: General Data Protection Regulation (GDPR), Personally Identifiable Information, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Data Ethics, Cyber Governance, Security Controls, Cyber Risk, Data Access, Encryption, Risk Management Framework
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
- Status: New
Skills you'll gain: Cyber Threat Intelligence, Vulnerability Assessments, Incident Response, Vulnerability Scanning, Cybersecurity, Threat Modeling, Threat Detection, Application Security, Security Management, Intrusion Detection and Prevention, Security Engineering, Security Controls, Malware Protection, Network Analysis
- Status: NewStatus: Preview
Coursera Instructor Network
Skills you'll gain: Threat Modeling, Responsible AI, Cyber Security Strategy, Cyber Security Assessment, Data Ethics, Cybersecurity, Threat Detection, Cyber Risk, Cyber Attacks, Vulnerability Assessments, Artificial Intelligence, Data Security, Incident Response, Risk Modeling, Tensorflow, Data Integrity
- Status: Free Trial
Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
In summary, here are 10 of our most popular cyber-operationen courses
- Cybersecurity Foundations: Threats Networks, and IoT Protection:Â Johns Hopkins University
- AI in Sports: The Approach of a Club:Â Real Madrid Graduate School Universidad Europea
- Dominant Risk Management Standards and Frameworks:Â Kennesaw State University
- Personnel & Third-Party Security:Â University of California, Irvine
- Incident Response and Defense with OpenVAS:Â IBM
- Establishing Command-and-Control and Finding Credentials:Â Infosec
- Cybersecurity for Data Science:Â University of Colorado Boulder
- Introduction to Data Protection and Privacy:Â Coursera Instructor Network
- Advanced Cybersecurity Techniques:Â Johns Hopkins University
- TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003):Â Packt