Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber-operationen"
- Status: Free Trial
Skills you'll gain: Embedded Systems, Embedded Software, Computer Systems, Internet Of Things, System Programming, C (Programming Language), Hardware Architecture, Peripheral Devices, Wireless Networks, Computer Architecture, Cybersecurity, Cloud Computing, Development Environment, Debugging
- Status: Free Trial
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Cyber Operations, Scripting, Cybersecurity, Vulnerability Assessments, Python Programming, Network Analysis, Automation
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Supervised Learning, Microsoft Windows
- Status: Free Trial
Skills you'll gain: Continuous Monitoring, Business Continuity, Security Management, ISO/IEC 27001, Security Controls, Threat Management, Risk Management, Risk Analysis, Security Strategy, Business Risk Management, Cyber Risk, Regulation and Legal Compliance, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Risk Mitigation
- Status: Free Trial
Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Scripting, Vulnerability Assessments, Scripting Languages, General Networking, Python Programming, Web Applications, Cybersecurity, Firewall, Network Security, Cyber Operations, Data Ethics, Wireless Networks
- Status: Free Trial
Infosec
Skills you'll gain: Security Controls, Security Requirements Analysis, Continuous Monitoring, Cyber Security Policies, Information Assurance, Information Systems Security, Personally Identifiable Information, Data Security, Document Management
- Status: Free
Coursera Project Network
Skills you'll gain: Linux Commands, Linux, TCP/IP, Scripting, Shell Script, Network Monitoring, Network Analysis, Network Security, Network Protocols
- Status: Free Trial
Infosec
Skills you'll gain: Risk Management Framework, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cyber Risk, Security Management, Continuous Monitoring, Cyber Security Policies, Security Controls, Authorization (Computing), Information Privacy, Information Systems
- Status: Free Trial
L&T EduTech
Skills you'll gain: Embedded Systems, Embedded Software, Control Systems, Programmable Logic Controllers, Cyber Engineering, Internet Of Things, C (Programming Language), Automation, Computer Engineering, Electronic Systems, Simulation and Simulation Software, Integration Testing, Cloud Computing, Matlab
- Status: NewStatus: Free Trial
Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Cyber Attacks, Wireless Networks, Application Security, Network Monitoring, Linux, Object Oriented Programming (OOP), Vulnerability Assessments, Cyber Security Assessment, Intrusion Detection and Prevention
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Safety and Security, Information Technology, Information Privacy, Computer Literacy, Software Development Tools, Data Sharing, Technology Strategies
- Status: Free Trial
Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Scripting, Network Protocols, Authentications, Vulnerability Assessments, Python Programming, Data Access, System Monitoring, Automation
In summary, here are 10 of our most popular cyber-operationen courses
- Design of CPS with ARM processor using Embedded C:Â L&T EduTech
- Advanced Python - Reconnaissance:Â Infosec
- Advanced Malware and Network Anomaly Detection:Â Johns Hopkins University
- Security and Risk Management:Â Packt
- The Complete Ethical Hacking Bootcamp: Beginner To Advanced:Â Packt
- NIST 800-171:Â Infosec
- Analyze Network Traffic with TCPDump: Build a Logging Tool:Â Coursera Project Network
- NIST DoD RMF:Â Infosec
- CPS solution for Industries:Â L&T EduTech
- The Complete Ethical Hacking Course:Â Packt