Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security"
Status: Free TrialUniversity of Colorado System
Skills you'll gain: Application Security, Vulnerability Assessments, Software Design, Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Software Design Patterns, Software Architecture, Cryptography, Blockchain, Public Key Cryptography Standards (PKCS)
Status: Free TrialInfosec
Skills you'll gain: Network Analysis, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Network Monitoring, Anomaly Detection, Network Protocols
Status: Free TrialSkills you'll gain: User Story, Business Requirements, Requirements Analysis, Requirements Elicitation, Business Analysis, User Requirements Documents, Gap Analysis, Project Documentation, Systems Analysis, Functional Specification, Business Process Modeling, Process Flow Diagrams, Needs Assessment, Data Visualization
Status: Free TrialUniversity of Colorado Boulder
Skills you'll gain: Data Visualization, Machine Learning Algorithms, Product Planning, File Systems, Product Requirements, Project Planning, Big Data, Data Analysis, Data Processing, Data Wrangling, Plan Execution, Machine Learning, Internet Of Things, Data Storage Technologies, Design, Data Storage, Supervised Learning, Unsupervised Learning, Requirements Analysis
Status: Free TrialSkills you'll gain: Performance Tuning, Microarchitecture, Embedded Systems, Application Security, System Programming, Secure Coding, Computer Architecture, Hardware Architecture, Debugging
Status: Free TrialUniversity of Michigan
Skills you'll gain: Generative AI, Responsible AI, AI Product Strategy, Artificial Intelligence, Governance, Intellectual Property, Business Process Automation, Data Security, Leadership and Management, Data Quality
Status: Free TrialMicrosoft
Skills you'll gain: Data Security, Cloud Security, Azure Active Directory, Microsoft Azure, Data Storage, Microsoft SQL Servers, Data Encryption Standard, Authorization (Computing), Authentications, Database Management, Data Governance, Key Management, Role-Based Access Control (RBAC), Threat Modeling, Identity and Access Management, Firewall
Status: Free TrialUniversidad Nacional Autónoma de México
Skills you'll gain: Database Systems, Relational Databases, Database Management, SQL, Databases, Database Design, Database Architecture and Administration, Information Systems, MySQL, Data Modeling, Transaction Processing, Information Systems Security, Performance Tuning, Conceptual Design

Skills you'll gain: Unified Modeling Language, Embedded Systems, Internet Of Things, Software Development Life Cycle, Systems Architecture, Systems Design, Technical Design, Software Systems, Prototyping, Requirements Analysis

Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Vulnerability Scanning, Application Security, Exploitation techniques, Vulnerability Assessments, Data Security, Web Applications, SQL
Status: PreviewNortheastern University
Skills you'll gain: Medical Privacy, Health Informatics, Health Information Management, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Digital Transformation, Health Care, Clinical Informatics, Emerging Technologies, Information Privacy, Data Management, Technology Strategies, Cybersecurity, Data Security, Platform As A Service (PaaS), Security Strategy, Innovation, Data Integration
Status: Free TrialDuke University
Skills you'll gain: Lending and Underwriting, Blockchain, Commercial Lending, Derivatives, FinTech, Market Liquidity, Financial Trading, Securities (Finance), Digital Assets, Market Data, Transaction Processing, Asset Management, Portfolio Management, Risk Management
Searches related to cyber security
In summary, here are 10 of our most popular cyber security courses
- Software Design Threats and Mitigations:Â University of Colorado System
- Defensive Python:Â Infosec
- Requirements Gathering in Business Analysis:Â Microsoft
- Project Planning and Machine Learning:Â University of Colorado Boulder
- Advanced Armv8-M Features:Â Arm
- Generative AI: Fundamentals, Applications, and Challenges:Â University of Michigan
- Secure Your Data at Rest:Â Microsoft
- Relational database systems: Universidad Nacional Autónoma de México
- Introduction to Architecting Smart IoT Devices:Â EIT Digital
- Web Hacker's Toolbox - Tools Used by Successful Hackers:Â Packt










