Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security"
- Status: NewStatus: Free
Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Public Key Infrastructure, Data Integrity
- Status: Free
University of California, Santa Cruz
Skills you'll gain: Research, Critical Thinking, Storytelling, Systems Thinking, Analysis, Culture, Political Sciences, Social Sciences, Media and Communications
Splunk Inc.
Skills you'll gain: Splunk, Dashboard, Security Information and Event Management (SIEM), Incident Management, Information Management, Event Monitoring, Data Processing, Query Languages, Data Manipulation, Data Analysis
Northeastern University
Skills you'll gain: Health Care Administration, Digital Transformation, Health Systems, Healthcare Industry Knowledge, Health Information Management and Medical Records, IT Management, Personally Identifiable Information, Electronic Medical Record, Medical Records, Information Systems, Emerging Technologies, Information Privacy, Technology Strategies, Cybersecurity, Data Security, Regulatory Compliance, Platform As A Service (PaaS), Interoperability, Innovation
University of Minnesota
Skills you'll gain: Test Automation, Regression Testing, Software Testing, Software Development Tools, Unit Testing, Software Engineering Tools, Software Technical Review, JUnit, Development Testing, System Testing, Code Coverage, Security Testing, Verification And Validation, Test Case, Test Data, Debugging, Automation, Application Security, Vulnerability Scanning, Java Programming
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Incident Response, Stakeholder Communications, Vulnerability Assessments, Threat Detection, Cyber Attacks, Hardening, Network Security, Security Controls, Threat Management, Security Information and Event Management (SIEM), TCP/IP, Bash (Scripting Language), Cybersecurity, Linux, Debugging, Computer Security Incident Management
- Status: New
Skills you'll gain: Blockchain, Emerging Technologies, Artificial Intelligence and Machine Learning (AI/ML), FinTech, Artificial Intelligence, Generative AI, Semantic Web, Data Ethics, Internet Of Things, Web Applications, Business Ethics, Digital Assets, Governance, Health Care
Google Cloud
Skills you'll gain: Disaster Recovery, Data Management, Google Cloud Platform, Cloud Infrastructure, SAP Applications, Identity and Access Management, Cloud Computing, Cloud Security, IT Infrastructure, Cloud Storage, Virtual Machines, Load Balancing, Network Infrastructure, Scalability, Systems Design, Business Continuity, Automation
Google Cloud
Skills you'll gain: Change Management, Data Migration, Organizational Change, Google Workspace, Application Deployment, User Provisioning, Cloud Computing, Calendar Management, Email Security, Stakeholder Management
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cyber Security Policies, Cloud Security, Firewall, Cybersecurity, Malware Protection, Identity and Access Management, Network Security, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Intrusion Detection and Prevention, Scenario Testing, Role-Based Access Control (RBAC), Encryption, Virtual Machines
Packt
Skills you'll gain: Data Security, Data Loss Prevention, Data Management, Security Management, Security Controls, Personally Identifiable Information, Cloud Security, Information Management, Data Governance, Security Requirements Analysis
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Network Security, Threat Detection, Firewall, Code Review, Routing Protocols, Proxy Servers, Linux, Internet Of Things, Servers
In summary, here are 10 of our most popular cyber security courses
- Cybersecurity and Secure Software Design:Â Ball State University
- Conspiracy Planet:Â University of California, Santa Cruz
- Splunk Knowledge Manager 101:Â Splunk Inc.
- Healthcare Data Management and Information Systems:Â Northeastern University
- Introduction to Automated Analysis:Â University of Minnesota
- Cybersécurité Google: Google
- Generative AI and Blockchain:Â INSEAD
- Deploying SAP on Google Cloud:Â Google Cloud
- Planning for a Google Workspace Deployment:Â Google Cloud
- Azure Cybersecurity Solutions And Microsoft Defender :Â Microsoft