Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security"
Skills you'll gain: Power BI, Dashboard, SQL, Microsoft SQL Servers, Business Intelligence, Data Security, Data Analysis, Data Visualization Software, Data Modeling, Data Management, Data-Driven Decision-Making
Google Cloud
Skills you'll gain: Digital Transformation, Cloud Services, Cloud Infrastructure, Infrastructure As A Service (IaaS), Cloud Computing, Public Cloud, Business Transformation, Google Cloud Platform, Software As A Service, Platform As A Service (PaaS), Hybrid Cloud Computing, Cloud Security, Multi-Cloud, Capital Expenditure, Operating Expense
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Information Privacy, Personally Identifiable Information, Regulation and Legal Compliance, Compliance Management, Data Security, Financial Regulation, Health Care Procedure and Regulation, Data Governance, Health Information Management and Medical Records, Incident Response
- Status: AI skills
Skills you'll gain: Git (Version Control System), Software Development Methodologies, JUnit, Requirements Analysis, Application Development, Software Development Life Cycle, Full-Stack Web Development, Test Driven Development (TDD), Version Control, Restful API, Object Oriented Programming (OOP), Object Oriented Design, Digital Transformation, Java Programming, Generative AI, Java, Front-End Web Development, GitHub, Unified Modeling Language, ChatGPT
- Status: Free
Yonsei University
Skills you'll gain: TCP/IP, Network Protocols, Network Routing, Network Security, General Networking, Intrusion Detection and Prevention, File Transfer Protocol (FTP), Dynamic Host Configuration Protocol (DHCP), Network Architecture, Network Analysis
University of London
Skills you'll gain: Network Security, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Encryption
LearnKartS
Skills you'll gain: Penetration Testing, Network Security, Malware Protection, Cybersecurity, Threat Detection, Information Systems Security, Cyber Threat Intelligence, Intrusion Detection and Prevention, Firewall, Cyber Attacks, Vulnerability Assessments, Internet Of Things, Encryption, Network Analysis
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Security Testing, Cybersecurity, Security Management, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Cyber Attacks, Malware Protection, Vulnerability Management, Payment Card Industry (PCI) Data Security Standards, Artificial Intelligence
Skills you'll gain: Desktop Support, Network Troubleshooting, Hardware Troubleshooting, Operating Systems, Command-Line Interface, Network Administration, System Support, System Configuration, Computer Hardware, Network Security, Mobile Security, Microsoft Windows, General Networking, Technical Support and Services, Unix Commands, Mac OS, Linux, Technical Support, Linux Commands, Computer Networking
University of Pennsylvania
Skills you'll gain: Blockchain, Cryptography, Digital Assets, Investments, Portfolio Management, Investment Management, FinTech, Asset Management, Financial Analysis, Financial Market, Emerging Technologies, Public Key Infrastructure, Finance, Payment Systems, Encryption, Return On Investment, Data Security, Data Integrity, Risk Analysis
Microsoft
Skills you'll gain: Stakeholder Management, Business Analysis, Project Management, Analysis, Business Requirements, Risk Management, Microsoft Power Platform, Requirements Analysis, Problem Management
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
In summary, here are 10 of our most popular cyber security courses
- Deploy and Maintain Power BI Assets and Capstone project:Â Microsoft
- Digital Transformation with Google Cloud:Â Google Cloud
- Privacy Law and Data Protection:Â University of Pennsylvania
- Amazon Junior Software Developer:Â Amazon
- Introduction to TCP/IP:Â Yonsei University
- Introduction to Network Security:Â University of London
- System and Network Security:Â LearnKartS
- Cybersecurity Case Studies and Capstone Project:Â IBM
- Preparation for CompTIA A+ Certification:Â IBM
- Cryptocurrency and Blockchain: An Introduction to Digital Currencies:Â University of Pennsylvania