Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security"
- Status: New
Skills you'll gain: WordPress, Web Analytics and SEO, Content Management Systems, Web Design and Development, Web Content, Web Development Tools, Application Security, Software Installation, File Transfer Protocol (FTP), Cloud Hosting
EIT Digital
Skills you'll gain: Technical Standard, General Data Protection Regulation (GDPR), Personally Identifiable Information, Information Privacy, Law, Regulation, and Compliance, Ethical Standards And Conduct, Data Ethics, Technology Roadmaps, International Relations, Cultural Sensitivity, Data Security, Interoperability, Social Studies, Health Information Management and Medical Records, Regulation and Legal Compliance, Cybersecurity, Emerging Technologies, Political Sciences, Health Care Procedure and Regulation, Data Sharing
Columbia University
Skills you'll gain: Portfolio Management, Investment Management, Asset Management, Market Liquidity, Risk Management, Financial Market, Equities, Capital Markets, Statistical Methods, Risk Analysis, Securities Trading, Market Dynamics, Financial Analysis, Market Data, Statistical Analysis
Tableau Learning Partner
Skills you'll gain: Requirements Elicitation, Business Analysis, Business Metrics, Key Performance Indicators (KPIs), Requirements Analysis, Business Requirements, Process Analysis, Stakeholder Management, Business Process, Business Process Modeling, Tableau Software, Data Visualization
Fortinet, Inc.
Skills you'll gain: Virtual Private Networks (VPN), Firewall, Network Routing, Intrusion Detection and Prevention, Authentications, Lightweight Directory Access Protocols, Network Security, Network Administration, Security Controls, System Configuration, Network Monitoring
Coursera Project Network
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Information Systems Security, Data Ethics, Command-Line Interface, Technical Documentation
Starweaver
Skills you'll gain: Stakeholder Management, Stakeholder Engagement, Organizational Change, Conflict Management, Business Relationship Management, Relationship Management, Requirements Analysis, Change Management, Expectation Management, Communication Strategies, Active Listening
Skills you'll gain: Dataflow, Serverless Computing, Identity and Access Management, Data Pipelines, Google Cloud Platform, Cloud Security, Data Processing, Data Security, Data Storage Technologies, Containerization, Real Time Data
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Contingency Planning, Risk Management, Cyber Security Strategy, Security Management, Cybersecurity, Governance, Information Technology, Staff Management, Proposal Development, Organizational Structure, Presentations
Skills you'll gain: Data Governance, Data Loss Prevention, Security Testing, Data Migration, Network Security, Database Management, Systems Development Life Cycle, Incident Management, Software Development Life Cycle, Problem Management, Disaster Recovery, Resource Management, Control Objectives for Information and Related Technology (COBIT), Cryptography, IT Management, Compliance Auditing, Information Technology, Auditing, Test Planning, Risk Control
Skills you'll gain: DevOps, Continuous Integration, CI/CD, OpenShift, Kubernetes, User Story, Application Deployment, Test Driven Development (TDD), Code Review, Containerization, Agile Methodology, Kanban Principles, Flask (Web Framework), Application Security, Unit Testing, GitHub, Agile Project Management, Restful API
University of Illinois Urbana-Champaign
Skills you'll gain: Distributed Computing, File Systems, Cloud Computing, Transaction Processing, Network Security, Data Centers, Authorization (Computing), Apache Hadoop, Data Store, Authentications, Scalability, NoSQL, Algorithms, Encryption, Graph Theory
In summary, here are 10 of our most popular cyber security courses
- WordPress 101 - The Complete Guide:Â Packt
- Privacy and Standardisation:Â EIT Digital
- Optimization Methods in Asset Management:Â Columbia University
- Business Analysis Process:Â Tableau Learning Partner
- FortiGate Administrator:Â Fortinet, Inc.
- Metasploit for Beginners: Ethical Penetration Testing:Â Coursera Project Network
- Stakeholder Management :Â Starweaver
- Serverless Data Processing with Dataflow: Foundations:Â Google Cloud
- Road to the CISO – Culminating Project Course: Kennesaw State University
- CISA: Certified Information Systems Auditor:Â Packt