Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber operations"
- Status: New
Skills you'll gain: Cyber Operations, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Cyber Attacks, Incident Response, Information Systems Security, Risk Management Framework, Network Security, Security Information and Event Management (SIEM), Event Monitoring, Network Analysis, Firewall, Vulnerability Management, Data Integrity
University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Cyber Governance, Cyber Risk, Cyber Security Assessment, Security Strategy, Cyber Security Policies, Security Management, Security Awareness, Threat Modeling, Information Privacy, Infrastructure Security, Risk Management, Vulnerability Assessments
- Status: Free Trial
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
- Status: New
Skills you'll gain: Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Security Assessment, Threat Modeling, Threat Detection, Intrusion Detection and Prevention, Exploitation techniques, Security Management, Network Security, Malware Protection, Network Analysis
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Applied Machine Learning, Network Security, Machine Learning Algorithms, Machine Learning, Machine Learning Software, Unsupervised Learning, Supervised Learning, Artificial Neural Networks
- Status: New
Macquarie University
Skills you'll gain: Security Awareness, Cyber Attacks, Cyber Risk, Mobile Security, Cybersecurity, Cyber Security Strategy, Cyber Governance, Malware Protection, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Data Security, Cyber Threat Hunting, Human Factors (Security), Email Security, Identity and Access Management, Security Management, Security Strategy, Multi-Factor Authentication, Cloud Security
- Status: Free Trial
Packt
Skills you'll gain: Threat Management, Threat Modeling, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Vulnerability Management, Threat Detection, Cyber Security Assessment, Cyber Threat Intelligence, Risk Mitigation, Security Management, Hardening, Application Security, Infrastructure Security
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Cyber Threat Intelligence, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Risk Management, Security Awareness, Information Systems Security, Cyber Operations, Incident Response, Network Security, Risk Analysis, Asset Management
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Contingency Planning, Risk Management, Cyber Security Strategy, Security Management, Enterprise Risk Management (ERM), Business Risk Management, IT Management, Cybersecurity, Governance, Cyber Risk, Information Technology, Staff Management, Organizational Leadership, Organizational Structure
- Status: Free Trial
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
- Status: Free Trial
Skills you'll gain: Microsoft Azure, Identity and Access Management, Network Security, Cloud Security, Security Management, Authorization (Computing), Data Access, Security Information and Event Management (SIEM), Firewall, Role-Based Access Control (RBAC), Continuous Monitoring, Key Management, Threat Detection, IT Automation, Incident Management
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
Searches related to cyber operations
In summary, here are 10 of our most popular cyber operations courses
- Cisco CyberOps Associate (200-201):Â Packt
- A Strategic Approach to Cybersecurity:Â University of Maryland, College Park
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- CyberSec First Responder (CFR-310):Â Packt
- Machine Learning and Emerging Technologies in Cybersecurity:Â Johns Hopkins University
- Cyber Security: Essentials:Â Macquarie University
- Security Operations:Â Packt
- Cybersecurity Foundations for Risk Management:Â Kennesaw State University
- Road to the CISO – Culminating Project Course: Kennesaw State University
- Cyber Attack Countermeasures:Â New York University