Filtern nach
BetreffErforderlich
SpracheErforderlich
Die im gesamten Kurs, sowohl für Anweisungen als auch Bewertungen, verwendete Sprache.
LernproduktErforderlich
NiveauErforderlich
DauerErforderlich
UntertitelErforderlich
LehrkraftErforderlich
Erkunden Sie den Cybersicherheits-Kurskatalog
- Status: Kostenloser Testzeitraum
Johns Hopkins University
Kompetenzen, die Sie erwerben: Generative AI, Fraud detection, Feature Engineering, Cybersecurity, Cyber Security Strategy, Threat Modeling, Deep Learning, Anomaly Detection, Artificial Intelligence, Security Testing, Machine Learning Methods, Reinforcement Learning, Machine Learning
- Status: Kostenloser Testzeitraum
Johns Hopkins University
Kompetenzen, die Sie erwerben: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Supervised Learning, Microsoft Windows
- Status: Kostenloser Testzeitraum
Infosec
Kompetenzen, die Sie erwerben: Analyse der Sicherheitsanforderungen, Sicherheitskontrollen, Management von Zwischenfällen, Risikomanagement, Sicherheitsmanagement, Cyber-Governance, Leistungsmetrik, Vermögensverwaltung, Cyber-Sicherheitsstrategie, Compliance-Prüfung, Geschäftskontinuität, Katastrophenhilfe, Ressourcenmanagement
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, Exploit development, Intrusion Detection and Prevention, System Configuration, Virtual Machines
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Incident Response, Network Security, Intrusion Detection and Prevention, Computer Security Incident Management, Command-Line Interface, Cryptography, Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Application Security, Secure Coding, Cybersecurity, Encryption, Information Systems Security, Vulnerability Assessments, Metasploit, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
- Status: Kostenloser Testzeitraum
Kennesaw State University
Kompetenzen, die Sie erwerben: Risk Analysis, Risk Management, Threat Management, Threat Modeling, Cyber Risk, Security Management, Governance, Cybersecurity, Cyber Security Strategy, Asset Management, Cyber Security Assessment, Project Documentation, Presentations
- Status: Kostenloser Testzeitraum
University of Minnesota
Kompetenzen, die Sie erwerben: Autorisierung (Computing), Sichere Kodierung, Anwendungssicherheit, Sicherheitskontrollen, Authentifizierungen, Cyber-Risiko, Datensicherheit, Systemüberwachung, Kryptographie, Management von Bedrohungen, Cloud Computing, Sicherheitsprüfung, Cloud-Sicherheit, Open Web Application Security Project (OWASP), Identitäts- und Zugriffsmanagement
Kompetenzen, die Sie erwerben: Security Management, Vulnerability Assessments, Threat Management, IT Management, Security Strategy, Cyber Governance, Risk Management Framework, Security Controls, Cyber Risk, Security Awareness, Disaster Recovery
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cybersecurity, Cyber Security Strategy, Vulnerability Scanning, Cyber Attacks, Vulnerability Assessments, Network Security, Network Analysis
- Status: Kostenloser Testzeitraum
Johns Hopkins University
Kompetenzen, die Sie erwerben: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Cyber Operations, Security Testing, Vulnerability Scanning, Network Security, Operating Systems, Encryption
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Risk Management Framework, Incident Response, Cyber Security Policies, Secure Coding, Cybersecurity, Computer Security Incident Management, Cyber Security Assessment, Threat Modeling, Application Security, ISO/IEC 27001, Cyber Governance, Data Security, Malware Protection, Penetration Testing, Security Controls, Threat Detection
- Status: Kostenloser Testzeitraum
Infosec
Kompetenzen, die Sie erwerben: Leiterschaft, IT-Verwaltung, Kommunikation, Wichtige Leistungsindikatoren (KPIs), Risikomanagement, Cyber-Risiko, Cyber-Governance, Cyber-Sicherheitsstrategie, Programm-Management, Cyber-Sicherheitsrichtlinien, Sicherheitsmanagement, Führung und Management, Sicherheitsstrategie, Technische Kommunikation
Zusammenfassend finden Sie hier 10 unsere beliebtesten cybersecurity Kurse
- Securing AI and Advanced Topics: Johns Hopkins University
- Advanced Malware and Network Anomaly Detection: Johns Hopkins University
- Governance und Strategie: Infosec
- Ethical Hacking with Kali Linux: IBM
- CompTIA Security+ Certification (SY0-701): The Total Course: Packt
- Implementing a Risk Management Framework : Kennesaw State University
- Top Ten der Cloud-Risiken: University of Minnesota
- Certified Information Security Manager (CISM): Packt
- Introduction to Ethical Hacking and Recon Techniques: Packt
- Introduction to Ethical Hacking: Johns Hopkins University