Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "computerkenntnisse"
- Status: Preview
Macquarie University
Skills you'll gain: Data Visualization, Microsoft Excel, Excel Formulas, Spreadsheet Software, Data Entry, Microsoft Office, Data Management, Productivity Software, Data Import/Export
- Status: Free Trial
Skills you'll gain: Threat Management, Threat Modeling, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Public Key Infrastructure, IT Security Architecture, Disaster Recovery, Vulnerability Management, Regulation and Legal Compliance, Threat Detection, Cyber Security Assessment, Risk Management, Compliance Management, Network Security, Infrastructure Security, Cloud Security, Hardening, Security Engineering, Software-Defined Networking
- Status: Free Trial
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Cybersecurity, Computer Security, Authentications, Data Security, Theoretical Computer Science, Algorithms, Digital Communications, Information Architecture
- Status: Free Trial
Skills you'll gain: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, Cyber Governance, Intrusion Detection and Prevention, Risk Management Framework, Cyber Threat Intelligence, Network Infrastructure, Network Security, Security Information and Event Management (SIEM)
- Status: Free Trial
University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, Enterprise Application Management, OSI Models, User Accounts, Group Policy, Security Management, Operating System Administration, Systems Administration, Virtualization, Cybersecurity
- Status: Free Trial
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Problem Solving, Computational Thinking, Computer Vision, Game Theory, Image Analysis, Probability, Artificial Neural Networks, Mathematical Modeling, Deductive Reasoning, Algorithms, Human Development, Analytical Skills, Behavioral Economics, Artificial Intelligence and Machine Learning (AI/ML), Computer Graphics, Artificial Intelligence, Systems Thinking, Human Learning, Theoretical Computer Science, Human Machine Interfaces
- Status: Free Trial
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
- Status: Free Trial
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Stakeholder Communications, Vulnerability Assessments, Threat Detection, Hardening, Network Security, Threat Management, Security Controls, Security Information and Event Management (SIEM), TCP/IP, Risk Management Framework, Linux, Debugging, Cybersecurity, SQL
- Status: Free Trial
Board Infinity
Skills you'll gain: Business Continuity Planning, Incident Response, Cybersecurity, Risk Mitigation, Cyber Threat Hunting, Risk Management Framework, Cyber Risk, Risk Management, Risk Analysis, Network Security, Threat Management, IT Management, Vulnerability Management, Security Management, Enterprise Risk Management (ERM), Cyber Security Strategy, Cyber Security Policies, Business Risk Management, Cyber Threat Intelligence, Computer Security Incident Management
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Threat Detection, Human Factors (Security), Business Risk Management, Cybersecurity, Security Awareness, Enterprise Risk Management (ERM), Information Management, Computer Security Awareness Training, Mobile Security, Business Ethics, Performance Measurement, Cyber Risk
- Status: Free Trial
Microsoft
Skills you'll gain: Business Software, Computer Hardware, Generative AI, Operating Systems, Data Storage Technologies, Computer Systems, Data Maintenance, Enterprise Security, System Software, Information Technology, Computer Architecture, Data Storage, System Configuration, Technical Support and Services, Microsoft Windows, Servers, Cybersecurity
In summary, here are 10 of our most popular computerkenntnisse courses
- Excel-Kenntnisse für Unternehmen: Grundlagen: Macquarie University
- CompTIA CASP+ (CAS-004): Packt
- Applied Cryptography: University of Colorado System
- CompTIA CySA+ (CS0-003): Packt
- Computer Security and Systems Management: University of Colorado System
- Introduction to Applied Cryptography: University of Colorado System
- Mind and Machine: University of Colorado Boulder
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- Cybersécurité Google: Google
- Cisco Cybersecurity Fundamentals: Board Infinity