Filtern nach
BetreffErforderlich
SpracheErforderlich
Die im gesamten Kurs, sowohl für Anweisungen als auch Bewertungen, verwendete Sprache.
LernproduktErforderlich
NiveauErforderlich
DauerErforderlich
UntertitelErforderlich
LehrkraftErforderlich
Erkunden Sie den Cybersicherheits-Kurskatalog
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Information Systems Security, Software Installation, Virtual Machines
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Network Monitoring, Network Troubleshooting, Network Security, Incident Response, Anomaly Detection, Network Analysis, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity, Vulnerability Assessments
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cybersecurity, Cyber Security Strategy, Vulnerability Scanning, Cyber Attacks, Vulnerability Assessments, Network Security, Network Analysis
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Cryptography, Encryption, Risk Management Framework, Multi-Factor Authentication, Information Systems Security, Cybersecurity, Identity and Access Management, Authentications, Personally Identifiable Information, Security Controls, Threat Management, Data Security, Information Privacy, Network Security, Authorization (Computing)
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, Exploit development, Intrusion Detection and Prevention, System Configuration, Virtual Machines
Coursera Project Network
Kompetenzen, die Sie erwerben: Bash (Scripting Language), Shell Script, Unix Shell, Scripting, Linux Commands, Unix Commands, Scripting Languages, Command-Line Interface, Linux, File Management, Unix, File Systems
- Status: Kostenloser Testzeitraum
University of Colorado System
Kompetenzen, die Sie erwerben: Algorithmen, Informatik, Angewandte Mathematik, Kryptographie, Arithmetik, Wahrscheinlichkeit
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Continuous Monitoring, Medical Privacy, Personally Identifiable Information, Risk Management, Health Information Management, Regulatory Compliance, Data Management, Information Privacy, Health Care Procedure and Regulation, Risk Mitigation, Healthcare Industry Knowledge, Security Management, Risk Analysis, Health Care, Patient Safety, Security Awareness, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Data Security, Cybersecurity, Information Systems Security
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Network Troubleshooting, Computer Security Incident Management, Incident Response, Cybersecurity, Cyber Attacks, Cyber Security Policies, Networking Hardware, Threat Detection, Technical Support, Network Security, General Networking, Computer Networking, Network Architecture, Network Administration, Network Protocols
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Vulnerability Assessments, Information Systems Security, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines
- Status: Kostenloser Testzeitraum
University of California San Diego
Kompetenzen, die Sie erwerben: Cybersicherheit, Maschinelles Lernen, Überwachtes Lernen, Informationen zum Datenschutz, Informatik, Datenethik, Verschlüsselung, Big Data, AI-Personalisierung, Künstliche neuronale Netze, Verantwortungsvolle KI, Web-Server, Kryptographie, Datensicherheit, Pädagogik, Informationstechnologie
- Status: Neu
Kompetenzen, die Sie erwerben: Security Controls, IT General Controls (ITGC), Cloud Security, Cloud Computing, Cyber Security Assessment, Cybersecurity, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Risk Management Framework, Data Security, Identity and Access Management, Incident Response, Technical Communication
Zusammenfassend finden Sie hier 10 unsere beliebtesten cybersecurity Kurse
- Exploitation and Penetration Testing with Metasploit: IBM
- Network Traffic Analysis with Wireshark: SkillUp
- Introduction to Ethical Hacking and Recon Techniques: Packt
- Security Fundamentals and Identity Management: Packt
- Ethical Hacking with Kali Linux: IBM
- Introduction to Bash Shell Scripting: Coursera Project Network
- Mathematische Grundlagen der Kryptographie: University of Colorado System
- ISC2 Healthcare Certificate: ISC2
- Dell Technologies Networking & Security Technical Support: Dell
- Ethical Hacking Foundations & Network Security: Packt