Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security"
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cyber Security Policies, Cloud Security, Firewall, Cybersecurity, Malware Protection, Identity and Access Management, Network Security, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Intrusion Detection and Prevention, Scenario Testing, Role-Based Access Control (RBAC), Encryption, Virtual Machines
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Network Security, Threat Detection, Firewall, Code Review, Routing Protocols, Proxy Servers, Linux, Internet Of Things, Servers
Skills you'll gain: Azure Active Directory, Single Sign-On (SSO), Identity and Access Management, Authentications, Authorization (Computing), Active Directory, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), User Accounts, Security Controls, Cloud Services
Packt
Skills you'll gain: Data Security, Data Loss Prevention, Data Management, Security Management, Security Controls, Personally Identifiable Information, Cloud Security, Information Management, Data Governance, Security Requirements Analysis
- Status: NewStatus: Free
Coursera Instructor Network
Skills you'll gain: Generative AI, Regulatory Compliance, Regulatory Requirements, Compliance Management, Governance, Governance Risk Management and Compliance, Risk Management, Financial Regulation, Anomaly Detection, Artificial Intelligence, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Predictive Analytics
Skills you'll gain: Backlogs, Requirements Management, User Requirements Documents, Performance Measurement, Requirements Analysis, Business Analysis, Root Cause Analysis, Project Performance, Performance Analysis, Jira (Software), Solution Architecture, Process Improvement, Data-Driven Decision-Making, Prioritization, Change Management, Stakeholder Management
Scrimba
Skills you'll gain: OpenAI, Generative AI, Data Ethics, Artificial Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Application Programming Interface (API), Image Analysis, Applied Machine Learning, Technical Communication, Safety and Security
University of Colorado System
Skills you'll gain: Requirements Elicitation, Requirements Analysis, Mockups, Interviewing Skills, Storyboarding, Functional Requirement, Business Requirements, Prototyping, User Research, Stakeholder Engagement, Scenario Testing, Information Architecture, Prioritization
LearnKartS
Skills you'll gain: Amazon S3, Amazon Web Services, AWS Identity and Access Management (IAM), Cloud Security, Amazon DynamoDB, Amazon CloudWatch, Relational Databases, Cloud Computing, Database Management, Data Storage, Cloud Infrastructure, Identity and Access Management, System Monitoring, NoSQL
Duke University
Skills you'll gain: Data Pipelines, Rust (Programming Language), Restful API, Amazon Web Services, Data Structures, Data Processing, Application Programming Interface (API), Cloud Applications, Data Manipulation, Encryption, Algorithms, Command-Line Interface
Skills you'll gain: Incident Response, Cybersecurity, Human Factors (Security), Security Awareness, Continuous Monitoring, Cyber Security Strategy, Cyber Governance, Crisis Management, Computer Security Awareness Training, Culture Transformation, Threat Management, Threat Detection, Organizational Change, Communication Planning, Employee Engagement
Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Role-Based Access Control (RBAC), Authorization (Computing), User Accounts, Security Controls, OAuth, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Enterprise Security, Network Security, Network Protocols
In summary, here are 10 of our most popular cyber security courses
- Azure Cybersecurity Solutions And Microsoft Defender : Microsoft
- DDoS Attacks and Defenses: University of Colorado System
- Cybersecurity Identity and Access Solutions with Azure AD: Microsoft
- Asset Security: Packt
- GenAI for Fraud Detection and Compliance: Coursera Instructor Network
- Advanced Requirements Management & Solution Evaluation: Starweaver
- Intro to AI Engineering: Scrimba
- Requirements Elicitation: Artifact and Stakeholder Analysis: University of Colorado System
- AWS Services: LearnKartS
- Data Engineering with Rust: Duke University