Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber-operationen"
- Status: Free Trial
Skills you'll gain: Threat Management, Threat Modeling, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Public Key Infrastructure, IT Security Architecture, Disaster Recovery, Vulnerability Management, Regulation and Legal Compliance, Threat Detection, Cyber Security Assessment, Risk Management, Compliance Management, Network Security, Infrastructure Security, Cloud Security, Hardening, Security Engineering, Software-Defined Networking
- Status: Free Trial
Coursera Instructor Network
Skills you'll gain: Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Attacks, Threat Modeling, Cyber Security Assessment, Risk Analysis, Vulnerability Assessments, Network Security, Security Strategy, Risk Mitigation
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
- Status: Free Trial
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authorization (Computing), Cyber Risk, Authentications, Cloud Computing, Threat Management, Security Controls, Application Security, Secure Coding, System Monitoring, Cryptography, Security Testing, Data Security, Identity and Access Management
- Status: Free Trial
Skills you'll gain: Cyber Security Assessment, Compliance Management, Internal Controls, Threat Detection, Governance, Continuous Monitoring, Data Management, Disaster Recovery, Key Performance Indicators (KPIs), Regulatory Requirements, Business Analysis, Organizational Structure, Accountability, Stakeholder Communications
- Status: Free Trial
Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
- Status: Free Trial
Skills you'll gain: Manufacturing Processes, Computer-Aided Design, Automation, Internet Of Things, Digital Transformation, Engineering Analysis, Industrial Engineering, Geometric Dimensioning And Tolerancing, Simulation and Simulation Software, Network Infrastructure, Information Technology, Product Lifecycle Management, Finite Element Methods, Cloud Computing, Real Time Data
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Systems Architecture, Linux
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Risk Analysis, Risk Management, Threat Management, Threat Modeling, Cyber Risk, Security Management, Governance, Cybersecurity, Cyber Security Strategy, Asset Management, Cyber Security Assessment, Project Documentation, Presentations
- Status: Free Trial
Skills you'll gain: NIST 800-53, Risk Analysis, Business Risk Management, Security Management, Continuous Monitoring, Security Controls, System Monitoring, Risk Management, Cybersecurity, Cyber Risk, Cyber Security Policies, Enterprise Security, Threat Detection, Auditing
- Status: Free Trial
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Security Strategy, Threat Management, Cybersecurity, Continuous Monitoring, Security Information and Event Management (SIEM), Network Security, Technical Communication
- Status: Preview
Microsoft
Skills you'll gain: Prompt Engineering, Microsoft Copilot, Security Information and Event Management (SIEM), Cyber Threat Hunting, Security Software, Microsoft Azure, Security Controls, Cyber Security Assessment, Incident Response, Generative AI, Artificial Intelligence, Query Languages
In summary, here are 10 of our most popular cyber-operationen courses
- CompTIA CASP+ (CAS-004):Â Packt
- Introduction to Prompt Injection Vulnerabilities:Â Coursera Instructor Network
- Advanced Cybersecurity Techniques:Â Johns Hopkins University
- Cloud Top Ten Risks:Â University of Minnesota
- CRISC: Certified in Risk and Information Systems Control:Â Packt
- Advanced Risk Management, Security Controls & Monitoring:Â Packt
- Digital Manufacturing: Introduction and Smart Design:Â L&T EduTech
- Check Point Jump Start: Harmony Endpoint Security:Â Check Point Software Technologies Ltd.
- Implementing a Risk Management Framework :Â Kennesaw State University
- Foundations of NIST Cybersecurity Frameworks:Â Packt