Filtern nach
BetreffErforderlich
SpracheErforderlich
Die im gesamten Kurs, sowohl für Anweisungen als auch Bewertungen, verwendete Sprache.
LernproduktErforderlich
NiveauErforderlich
DauerErforderlich
UntertitelErforderlich
LehrkraftErforderlich
Erkunden Sie den Cybersicherheits-Kurskatalog
- Status: Kostenloser Testzeitraum
Kennesaw State University
Kompetenzen, die Sie erwerben: Email Security, Personally Identifiable Information, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption
- Status: Vorschau
Kennesaw State University
Kompetenzen, die Sie erwerben: Sichere Kodierung, Cybersicherheit, Kryptographie, Anwendungssicherheit, Lebenszyklus der Systementwicklung, Sicherheitskontrollen, Risikomanagement, Recht, Sicherheit der Infrastruktur, Netzwerksicherheit, Governance, Identitäts- und Zugriffsmanagement, Sicherheit und Schutz, Katastrophenhilfe, IT-Sicherheitsarchitektur, Geschäftskontinuität
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Network Infrastructure, Network Security, Network Architecture, General Networking, Endpoint Security, Malware Protection, System Monitoring, Incident Response, Email Security, Operating Systems, Identity and Access Management
- Status: Kostenloser Testzeitraum
University of Colorado System
Kompetenzen, die Sie erwerben: Technologie-Lösungen, Cybersicherheit, Reaktion auf Vorfälle, Cyber-Operationen, Rahmen für das Risikomanagement, Cyber-Governance, Rechtliches Risiko, Cyber-Risiko, Sicherheit der Infrastruktur, Cyber-Sicherheitsrichtlinien, Cyber-Sicherheitsstrategie, Cyber-Angriffe
- Status: Vorschau
Edureka
Kompetenzen, die Sie erwerben: Cyber Security Assessment, Malware Protection, Automation, Human Machine Interfaces
- Status: Kostenloser Testzeitraum
University of Colorado System
Kompetenzen, die Sie erwerben: Cybersicherheit, Datensicherheit, Risikomanagement, Schulung zum Bewusstsein für Computersicherheit, Netzwerksicherheit, Authentifizierungen, Sicherheit für Unternehmen, Sicherheitsbewußtsein, Bewertungen der Anfälligkeit, Verschlüsselung
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: MITRE ATT&CK Framework, Penetration Testing, Incident Response, Cyber Threat Hunting, Cybersecurity, Cyber Threat Intelligence, DevSecOps, Cloud Security, Patch Management, Cyber Security Assessment, Exploitation techniques, Network Security, Computer Security Incident Management, Business Continuity, Cryptography, Responsible AI, Threat Modeling, Information Systems Security, DevOps, Disaster Recovery
- Status: NeuStatus: Kostenloser Testzeitraum
Advancing Women in Tech
Kompetenzen, die Sie erwerben: ISO/IEC 27001, Budget Management, Cybersecurity, Cyber Governance, Cyber Security Strategy, Leadership Development, Cyber Risk, Security Management, Information Systems Security, Business Strategies, Strategic Leadership, Leadership and Management, Risk Management, Business Metrics, Vendor Management, Team Leadership, Compliance Auditing, Business Communication, Information Technology, Artificial Intelligence and Machine Learning (AI/ML)
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Data Encryption Standard, Threat Modeling, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, Vulnerability Assessments, Application Security, Security Engineering, Authentications, Data Structures, Data Integrity, Artificial Intelligence, SQL
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Cybersecurity, Network Security, Business Continuity, Disaster Recovery, Cryptography, Encryption, Infrastructure as Code (IaC), Infrastructure Security, Software-Defined Networking, Security Management, Identity and Access Management, Security Controls, Computer Networking, System Monitoring, Authorization (Computing), Authentications
- Status: NeuStatus: Kostenloser Testzeitraum
LearnKartS
Kompetenzen, die Sie erwerben: Incident Response, Vulnerability Management, Computer Security Incident Management, Cyber Operations, Hardening, Cybersecurity, Security Controls, Vulnerability Assessments, Threat Detection, Identity and Access Management, Intrusion Detection and Prevention, IT Security Architecture, Information Systems Security, Vulnerability Scanning, Threat Management, Application Security, Mobile Security, Network Security, Authorization (Computing), Continuous Monitoring
- Status: NeuStatus: Kostenloser Testzeitraum
LearnKartS
Kompetenzen, die Sie erwerben: Cybersecurity, Threat Management, Cyber Attacks, Threat Detection, Cloud Security, Disaster Recovery, Network Security, Malware Protection, Data Security, Intrusion Detection and Prevention, Hardening, Systems Architecture, Encryption
Zusammenfassend finden Sie hier 10 unsere beliebtesten cybersecurity Kurse
- Cybersecurity: Protecting your Information at Home: Kennesaw State University
- Cybersecurity und seine zehn Bereiche: Kennesaw State University
- Cybersecurity Concepts: Packt
- Innere Sicherheit und Cybersecurity Zukunft: University of Colorado System
- Industrial Cybersecurity: Edureka
- Einführung in die Cybersecurity für Unternehmen: University of Colorado System
- Practical Cybersecurity Fundamentals: Pearson
- Real-World Cybersecurity Leadership: Advancing Women in Tech
- Master Basics of Cybersecurity Fundamentals Training: Simplilearn
- Practical Cybersecurity Fundamentals: Unit 1: Pearson