Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber operations"
- Status: Preview
University of London
Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Cyber Risk, Encryption, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response
- Status: Free Trial
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
- Status: Free Trial
Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Exploit development, Cybersecurity, Network Security, System Monitoring, Cyber Operations, Continuous Monitoring, Cyber Threat Intelligence, Exploitation techniques, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Persistence, Python Programming, Data Access, Computer Programming
- Status: NewStatus: Preview
Skills you'll gain: MITRE ATT&CK Framework, Endpoint Security, Cyber Threat Hunting, Cyber Threat Intelligence, Endpoint Detection and Response, Cloud Security, Threat Detection, Cyber Operations, Threat Management, Microsoft Copilot, Malware Protection, Security Information and Event Management (SIEM), Microsoft Azure, Vulnerability Management, Cloud Computing, Incident Response, Computer Security Incident Management, Azure Active Directory, Hybrid Cloud Computing, Incident Management
- Status: Preview
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Operations, Cyber Governance, Network Infrastructure, Conflict Management, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Psychology
- Status: Free Trial
Microsoft
Skills you'll gain: Virtual Private Networks (VPN), Cybersecurity, Multi-Factor Authentication, Authentications, Information Systems Security, Desktop Support, Network Security, Technical Support and Services, Information Privacy, Servers, Cloud Computing, Encryption, Identity and Access Management, Mac OS
- Status: Free Trial
Skills you'll gain: Risk Management Framework, Cyber Risk, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cybersecurity, Continuous Monitoring, Security Management, Cyber Governance, Risk Management, Security Controls, Infrastructure Security, Cyber Security Assessment, Incident Response, Vulnerability Assessments, Authorization (Computing), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
- Status: Free Trial
FAIR Institute
Skills you'll gain: Risk Analysis, Cyber Risk, Risk Appetite, Cyber Governance, Risk Modeling, Risk Management, Regulatory Compliance, Cybersecurity, Governance, Threat Management, Enterprise Risk Management (ERM), Continuous Monitoring, Cyber Security Strategy, Governance Risk Management and Compliance, Strategic Decision-Making, Insurance, Compliance Management, Threat Modeling, Business Risk Management, Business Communication
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Security Strategy, Cyber Governance, Risk Mitigation, Vendor Management, Vulnerability Assessments, Security Management, Cyber Risk, Compliance Management, Asset Management, Disaster Recovery, Supplier Management, Security Awareness, Cyber Security Strategy
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Anomaly Detection, Cyber Threat Intelligence, Intrusion Detection and Prevention, Cyber Security Strategy, Applied Machine Learning, Cybersecurity, Fraud detection, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Threat Detection, Malware Protection, Machine Learning, Network Analysis, Artificial Intelligence, Machine Learning Methods, MLOps (Machine Learning Operations), Artificial Neural Networks, Data-Driven Decision-Making
- Status: Preview
Google Cloud
Skills you'll gain: Cyber Operations, Security Management, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Threat Management, Cyber Threat Hunting, DevOps, Cyber Threat Intelligence, Security Engineering, Threat Detection, Incident Response, Site Reliability Engineering, Digital Transformation, Agile Methodology, Automation, Critical Thinking
- Status: Free Trial
Skills you'll gain: Terraform, CI/CD, Infrastructure as Code (IaC), Continuous Integration, Ansible, Application Performance Management, Prometheus (Software), Continuous Deployment, Kubernetes, Application Deployment, System Monitoring, Package and Software Management, GitHub, Software Development Tools, Docker (Software), Version Control, Containerization, YAML, Infrastructure As A Service (IaaS), Automation
In summary, here are 10 of our most popular cyber operations courses
- Cyber Security Fundamentals: University of London
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- Python for Cybersecurity: Infosec
- Exam Prep SC-200: Microsoft Security Operations Analyst: Whizlabs
- International Cyber Conflicts: The State University of New York
- Cybersecurity and Privacy: Microsoft
- Cybersecurity Risk Management Framework: Infosec
- Cyber Risk Management for Executives: FAIR Institute
- Introduction to Cybersecurity & Risk Management: University of California, Irvine
- Cyber Security: Application of AI: Macquarie University