Erwerben Sie das Wissen und die Fähigkeiten, die Sie für Ihren Aufstieg benötigen.
Diese Rolle hat eine 51.572 £ Durchschnittsgehalt ¹.
A Cyber Security Specialist monitors systems, responds to incidents, enforces policies, and protects data from unauthorized access and cyber threats.
Diese Rolle hat eine 51.572 £ Durchschnittsgehalt ¹.
von
Diese Rolle hat eine 50.053 £ Durchschnittsgehalt ¹.
A Cyber Security Analyst monitors IT systems, analyzes threats, finds vulnerabilities, and implements measures to protect data from cyber attacks.
Diese Rolle hat eine 50.053 £ Durchschnittsgehalt ¹.
von
Auf einen Abschluss hinarbeiten
Berufsbezogenes Zertifikat
Auf einen Abschluss hinarbeiten
Kurs
Auf einen Abschluss hinarbeiten
Berufsbezogenes Zertifikat
Berufsbezogenes Zertifikat
Auf einen Abschluss hinarbeiten
Berufsbezogenes Zertifikat
Spezialisierung
Vanderbilt University
Spezialisierung
Auf einen Abschluss hinarbeiten
Kurs
Macquarie University
Kurs
Berufsbezogenes Zertifikat
Spezialisierung
Spezialisierung
Die im gesamten Kurs, sowohl für Anweisungen als auch Bewertungen, verwendete Sprache.
LearnQuest
Kompetenzen, die Sie erwerben: Cybersecurity, Network Security, Internet Of Things, Infrastructure Security, Communication Systems, Wireless Networks, Network Protocols, Network Architecture, General Networking, Network Infrastructure, Data Security, Encryption, Distributed Computing
Anfänger · Kurs · 1–4 Wochen
Packt
Kompetenzen, die Sie erwerben: Incident Response, Disaster Recovery, Incident Management, Security Management, Cyber Operations, Business Continuity Planning, Safety and Security, Change Control, Threat Management, Security Information and Event Management (SIEM), Patch Management, Security Controls, Cybersecurity, Threat Detection, Intrusion Detection and Prevention, Hardening, Configuration Management, Continuous Monitoring, Vulnerability Management
Mittel · Kurs · 1–4 Wochen
Kompetenzen, die Sie erwerben: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols
Mittel · Kurs · 1–3 Monate
Kompetenzen, die Sie erwerben: Risk Management Framework, Incident Response, Cyber Security Policies, Secure Coding, Cybersecurity, Computer Security Incident Management, Cyber Security Assessment, Threat Modeling, Application Security, ISO/IEC 27001, Cyber Governance, Data Security, Malware Protection, Penetration Testing, Security Controls, Threat Detection
Mittel · Kurs · 1–3 Monate
University of California San Diego
Kompetenzen, die Sie erwerben: Maschinelles Lernen, Datenethik, Informationen zum Datenschutz, Kryptographie, Pädagogik, Cybersicherheit, AI-Personalisierung, Big Data, Verantwortungsvolle KI, Informatik, Web-Server, Datensicherheit, Überwachtes Lernen, Informationstechnologie, Künstliche neuronale Netze, Verschlüsselung
Anfänger · Kurs · 1–3 Monate
Check Point Software Technologies Ltd.
Kompetenzen, die Sie erwerben: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Systems Architecture, Linux
Anfänger · Kurs · 1–3 Monate
Kompetenzen, die Sie erwerben: Software Testing, Open Web Application Security Project (OWASP), Business Logic, Development Testing, Secure Coding, Cryptography, Cybersecurity, Test Case, Identity and Access Management, Authentications, Vulnerability Assessments, Data Validation, Network Protocols, Authorization (Computing), Web Applications
Mittel · Kurs · 1–4 Wochen
Kompetenzen, die Sie erwerben: Threat Modeling, Incident Response, IT Security Architecture, Secure Coding, Application Security, Identity and Access Management, Information Systems Security Assessment Framework (ISSAF), Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Security Strategy, Zero Trust Network Access, Security Awareness, Security Information and Event Management (SIEM), Risk Management Framework, Disaster Recovery, Security Controls, Cybersecurity, Enterprise Architecture
Anfänger · Spezialisierung · 1–3 Monate
Kompetenzen, die Sie erwerben: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)
Mittel · Kurs · 1–3 Monate
Packt
Kompetenzen, die Sie erwerben: Identity and Access Management, Application Security, Secure Coding, Security Testing, Information Systems Security, Cyber Security Assessment, Security Engineering, Security Controls, Risk Management Framework, Cybersecurity, Authentications, Threat Modeling, Network Security, Risk Management, Infrastructure Security, Data Security, Continuous Monitoring, Software Development Life Cycle, Authorization (Computing), Cryptography
Mittel · Kurs · 1–3 Monate
Kompetenzen, die Sie erwerben: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Digital Assets, Threat Modeling, Vulnerability Assessments, Cybersecurity, Regulatory Compliance, Enterprise Security, Network Security, Data Security, Law, Regulation, and Compliance, Information Systems Security, Secure Coding, Key Management, Distributed Denial-Of-Service (DDoS) Attacks
Anfänger · Spezialisierung · 1–3 Monate
Kompetenzen, die Sie erwerben: Remote Access Systems, Security Management, Data Security, Cybersecurity, Security Controls, Vulnerability Management, Computer Security Awareness Training, Security Strategy, Incident Response, Continuous Monitoring, Human Factors (Security), General Data Protection Regulation (GDPR), Information Privacy, System Implementation
Anfänger · Kurs · 1–4 Wochen