Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber-operationen"
Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)
- Status: Free Trial
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Cloud Security, Authentications
- Status: Free Trial
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Data Security, Human Factors (Security), Software As A Service
- Status: Free TrialStatus: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Vulnerability Scanning, Threat Management, Cloud Computing, Authentications, Active Directory, Operating Systems, Data Management, Computer Security Incident Management
- Status: New
Macquarie University
Skills you'll gain: Identity and Access Management, AWS Identity and Access Management (IAM), Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, Azure Active Directory, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Threat Detection, Cryptography, Risk Management, Remote Access Systems
- Status: Free Trial
Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Cyber Security Strategy, Incident Response, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis, Ethical Standards And Conduct
- Status: Preview
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Personally Identifiable Information, Malware Protection, Threat Management, Mitigation, Incident Management, Identity and Access Management
- Status: Free TrialStatus: AI skills
Google
Skills you'll gain: Threat Modeling, Network Security, Threat Management, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Intrusion Detection and Prevention, Security Management, Security Awareness, Cyber Attacks, Cybersecurity, Network Protocols, Cloud Security, Bash (Scripting Language), Debugging, Linux, Interviewing Skills, Python Programming, SQL
- Status: Free Trial
FAIR Institute
Skills you'll gain: Risk Analysis, Cyber Risk, Risk Modeling, Cybersecurity, Governance, Risk Management, Enterprise Risk Management (ERM), Strategic Decision-Making, Business Risk Management, Strategic Prioritization, Compliance Reporting, Management Reporting, Strategic Leadership, Business Communication
- Status: New
Macquarie University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Data Governance, Data Encryption Standard, Security Management, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53
- Status: NewStatus: Preview
Starweaver
Skills you'll gain: Identity and Access Management, Threat Detection, Cybersecurity, Cyber Attacks, Cyber Threat Intelligence, Threat Management, Cyber Security Policies, Incident Response, Zero Trust Network Access, Information Systems Security, MITRE ATT&CK Framework, Human Factors (Security), Security Management, Security Controls, Security Awareness, Computer Security Incident Management, Security Information and Event Management (SIEM), Endpoint Security, Security Strategy, General Data Protection Regulation (GDPR)
Skills you'll gain: Security Information and Event Management (SIEM), Prompt Engineering, ChatGPT, Cyber Threat Intelligence, Incident Response, Generative AI Agents, Vulnerability Assessments, Computer Security Incident Management, Cloud Security, Threat Detection, IT Automation, Microsoft Azure, OpenAI, Artificial Intelligence
In summary, here are 10 of our most popular cyber-operationen courses
- Cyber Secure Coder (CSC-110) :Â Packt
- Cyber Security in Manufacturing :Â University at Buffalo
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Microsoft Cybersecurity Analyst:Â Microsoft
- Cyber Security: Identity Access Management and Authentication:Â Macquarie University
- Foundations of Cybersecurity:Â Google
- Introduction to Cybersecurity Fundamentals:Â Coursera Instructor Network
- Google Cybersecurity:Â Google
- Foundations of Cyber Risk Management and FAIRâ„¢:Â FAIR Institute
- Cyber Security: Data Security and Information Privacy:Â Macquarie University