Filtrer par
ObjetObligatoire
LangueObligatoire
La langue utilisée tout au long du cours, tant dans l’enseignement que dans les évaluations.
Produit d'apprentissageObligatoire
NiveauObligatoire
DuréeObligatoire
Sous-titresObligatoire
ÉducateurObligatoire
Explorez le catalogue de cours de cybersécurité
- Statut : Essai gratuit
Johns Hopkins University
Compétences que vous acquerrez: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security
- Statut : Prévisualisation
Northeastern University
Compétences que vous acquerrez: Medical Privacy, Health Informatics, Health Information Management, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Digital Transformation, Health Care, Clinical Informatics, Emerging Technologies, Information Privacy, Data Management, Technology Strategies, Cybersecurity, Data Security, Platform As A Service (PaaS), Security Strategy, Innovation, Data Integration
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Open Web Application Security Project (OWASP), Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Encryption, Cloud Security, Web Applications, Internet Of Things, Cloud Computing, Network Architecture
- Statut : Essai gratuit
Compétences que vous acquerrez: Cadre ATT&CK de MITRE, Test de pénétration, Automatisation, Cybersécurité, Opérations cybernétiques, Scripting, Programmation en Python, Évaluations de la vulnérabilité, Analyse du réseau
- Statut : Essai gratuit
University of Colorado System
Compétences que vous acquerrez: Mathématiques appliquées, Arithmétique, Algorithmes, Cryptographie, Probabilité, Informatique
- Statut : Essai gratuit
Compétences que vous acquerrez: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cybersecurity, Cyber Security Strategy, Vulnerability Scanning, Cyber Attacks, Vulnerability Assessments, Network Security, Network Analysis
- Statut : Essai gratuit
Compétences que vous acquerrez: Cryptography, Encryption, Risk Management Framework, Multi-Factor Authentication, Information Systems Security, Cybersecurity, Identity and Access Management, Authentications, Personally Identifiable Information, Security Controls, Threat Management, Data Security, Information Privacy, Network Security, Authorization (Computing)
- Statut : Essai gratuit
LearnKartS
Compétences que vous acquerrez: Cybersecurity, Malware Protection, Cyber Attacks, Network Security, Information Systems Security, Intrusion Detection and Prevention, Penetration Testing, Firewall, Hardening, Threat Detection, Threat Management, Network Monitoring, Internet Of Things, Exploitation techniques
- Statut : Essai gratuit
Compétences que vous acquerrez: Security Testing, Vulnerability Scanning, Exploit development, Threat Modeling, Exploitation techniques, Problem Solving
- Statut : Essai gratuit
Compétences que vous acquerrez: Incident Response, Network Security, Intrusion Detection and Prevention, Computer Security Incident Management, Command-Line Interface, Cryptography, Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Application Security, Secure Coding, Cybersecurity, Encryption, Information Systems Security, Vulnerability Assessments, Metasploit, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
- Statut : Essai gratuit
Johns Hopkins University
Compétences que vous acquerrez: Generative AI, Fraud detection, Feature Engineering, Cybersecurity, Cyber Security Strategy, Threat Modeling, Deep Learning, Anomaly Detection, Artificial Intelligence, Security Testing, Machine Learning Methods, Reinforcement Learning, Machine Learning
- Statut : Essai gratuit
Compétences que vous acquerrez: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
En résumé, voici 10 de nos cours les plus populaires sur cybersecurity .
- Information Assurance Analysis: Johns Hopkins University
- Healthcare Data Management and Information Systems: Northeastern University
- Certified Ethical Hacker (CEH): Pearson
- Python avancé - Reconnaissance: Infosec
- Fondements mathématiques de la cryptographie: University of Colorado System
- Introduction to Ethical Hacking and Recon Techniques: Packt
- Security Fundamentals and Identity Management: Packt
- System and Network Security: LearnKartS
- CEH (v12) Practice Projects and Exam Simulators: LearnKartS
- CompTIA Security+ Certification (SY0-701): The Total Course: Packt