Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "jagd auf cyber-bedrohungen"
- Status: New
Skills you'll gain: Security Controls, IT General Controls (ITGC), Cloud Security, Cloud Computing, Cyber Security Assessment, Cybersecurity, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Risk Management Framework, Data Security, Identity and Access Management, Incident Response, Technical Communication
Skills you'll gain: Penetration Testing, Exploitation techniques, Cybersecurity, Vulnerability Assessments, Vulnerability Scanning, Linux, Operating System Administration, Command-Line Interface, Linux Commands, Cryptography, File Management, Virtual Environment, Microsoft Windows, Scripting
- Status: Free Trial
Skills you'll gain: Remote Access Systems, Network Troubleshooting, Network Administration, Virtual Private Networks (VPN), Hardening, TCP/IP, Cybersecurity, Dynamic Host Configuration Protocol (DHCP), Human Factors (Security), Technical Support and Services, Encryption, Command-Line Interface, Authentications, Wireless Networks
- Status: Preview
Johns Hopkins University
Skills you'll gain: Data Science, Data Management, Data Analysis, Data-Driven Decision-Making, Data Presentation, Exploratory Data Analysis, Machine Learning, Predictive Modeling, Statistical Inference
- Status: Free Trial
Skills you'll gain: Embedded Systems, Internet Of Things, Control Systems, Electronic Systems, Electronics, Maintenance, Repair, and Facility Services, Automation, Integrated Development Environments, Environmental Monitoring, System Monitoring, Infrastructure Architecture, Communication Systems, Real Time Data, Peripheral Devices
- Status: Free Trial
Packt
Skills you'll gain: Incident Response, Disaster Recovery, Incident Management, Security Management, Cyber Operations, Business Continuity Planning, Safety and Security, Change Control, Threat Management, Security Information and Event Management (SIEM), Patch Management, Security Controls, Cybersecurity, Threat Detection, Intrusion Detection and Prevention, Hardening, Configuration Management, Continuous Monitoring, Vulnerability Management
Skills you'll gain: Computer Security Incident Management, Incident Management, Cyber Threat Hunting, Microsoft Azure, Threat Modeling, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Data Integration, ChatGPT, Jupyter, AI Product Strategy, Automation, Query Languages
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Threat Detection, Cyber Security Policies, Intrusion Detection and Prevention, Network Troubleshooting, Firewall, Security Management, Infrastructure Security, Network Administration, System Configuration, Technical Support and Services, Software Installation
Coursera Project Network
Skills you'll gain: Instagram, Social Media, Social Media Content, Social Media Marketing, Social Media Strategy, Facebook, Product Promotion, Promotional Strategies, Advertising, Branding
- Status: Free Trial
Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Cyber Security Strategy, Solution Architecture, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk, Enterprise Architecture, Data Integrity
- Status: Preview
Rice University
Skills you'll gain: Microsoft Excel, Graphing, Spreadsheet Software, Pivot Tables And Charts, Excel Formulas, Data Analysis, Data Import/Export, Scatter Plots, Histogram, Data Presentation, Data Manipulation
Coursera Project Network
Skills you'll gain: Instagram, Social Media Content, Social Media, Social Media Management, Social Media Marketing, Facebook, Business Marketing, Social Media Strategy, Advertising
In summary, here are 10 of our most popular jagd auf cyber-bedrohungen courses
- IT & Cloud Audit Masterclass – Fundamentals to Advanced: Packt
- The Complete Pentesting and Privilege Escalation Course: Packt
- Advanced Security and Troubleshooting: Packt
- Ein Crashkurs in Datenwissenschaft: Johns Hopkins University
- CPS Design with ARM Core using MicroPython for Industries: L&T EduTech
- Security Operations: Packt
- Microsoft Sentinel: Complete Azure Introduction: Packt
- Check Point Jump Start: Quantum Management: Check Point Software Technologies Ltd.
- Erstelle einen Instagram Business Account: Coursera Project Network
- Fundamentals of Information System Security Architecture: LearnQuest