Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber operations"
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Cyber Threat Intelligence, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Risk Management, Security Awareness, Information Systems Security, Cyber Operations, Incident Response, Network Security, Risk Analysis, Asset Management
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software)
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Vulnerability Assessments, Cyber Security Strategy, Network Security, Cyber Risk, Threat Detection, Security Controls, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
- Status: Preview
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Threat Management, Security Controls, Cyber Security Strategy, Threat Detection, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Data Security, Network Security, Enterprise Security, Information Assurance, Incident Response, Data Integrity
- Status: Free Trial
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Threat Modeling, Malware Protection, Network Security, Infrastructure Security, Firewall, Threat Detection, Cloud Security, Endpoint Security, Security Controls, Software As A Service, Cloud Computing, Cryptography, Authentications
- Status: Free Trial
Board Infinity
Skills you'll gain: Threat Detection, Cyber Operations, Cybersecurity, Incident Response, Computer Security Incident Management, Network Security, Cyber Attacks, Cyber Security Policies, Intrusion Detection and Prevention, Information Systems Security, Threat Management, Continuous Monitoring, Security Controls, Security Information and Event Management (SIEM), Firewall, System Monitoring, Endpoint Security, System Configuration, Network Monitoring, Malware Protection
- Status: New
Skills you'll gain: Cyber Operations, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Cyber Attacks, Incident Response, Information Systems Security, Risk Management Framework, Network Security, Security Information and Event Management (SIEM), Event Monitoring, Network Analysis, Firewall, Vulnerability Management, Data Integrity
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
- Status: Preview
Google Cloud
Skills you'll gain: Cyber Operations, Security Management, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Threat Management, Cyber Threat Hunting, DevOps, Cyber Threat Intelligence, Security Engineering, Threat Detection, Incident Response, Site Reliability Engineering, Digital Transformation, Agile Methodology, Automation, Critical Thinking
- Status: Preview
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), Automation, Event Monitoring, Cyber Threat Hunting, Continuous Monitoring, System Monitoring, Anomaly Detection, Cybersecurity, Data Analysis Software, Artificial Intelligence and Machine Learning (AI/ML)
- Status: Free Trial
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management, Disaster Recovery
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Contingency Planning, Risk Management, Cyber Security Strategy, Security Management, Enterprise Risk Management (ERM), Business Risk Management, IT Management, Cybersecurity, Governance, Cyber Risk, Information Technology, Staff Management, Organizational Leadership, Organizational Structure
In summary, here are 10 of our most popular cyber operations courses
- Cybersecurity Foundations for Risk Management:Â Kennesaw State University
- Cybersecurity Foundations: Threats Networks, and IoT Protection:Â Johns Hopkins University
- The Foundations of Cybersecurity:Â Kennesaw State University
- Cybersecurity Best Practices:Â Coursera Instructor Network
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks
- Cisco Cybersecurity Operations Essentials:Â Board Infinity
- Cisco CyberOps Associate (200-201):Â Packt
- Advanced Cybersecurity Techniques:Â Johns Hopkins University
- Modern Security Operations:Â Google Cloud
- Automated Cyber Security Incident Response:Â EDUCBA