Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber-risiko"
- Status: Free Trial
Universidad de los Andes
Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Threat Modeling, IT Management, Cybersecurity, Exploitation techniques, Vulnerability Management, Cyber Security Assessment, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Cyber Risk, Human Factors (Security), Application Servers, Web Servers, Web Applications
- Status: Free Trial
Skills you'll gain: Cybersecurity, Cyber Operations, MITRE ATT&CK Framework, Exploitation techniques, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Microsoft Windows
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Network Security, Network Administration, Security Management, Firewall, Network Monitoring, Cybersecurity, General Networking, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, System Monitoring, Security Awareness, TCP/IP, Intrusion Detection and Prevention, Cloud Computing, Threat Detection
- Status: Free Trial
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management
- Status: Free Trial
University of Colorado System
Skills you'll gain: Contingency Planning, Disaster Recovery, Business Continuity Planning, Enterprise Application Management, Security Management, IT Management, System Monitoring, System Implementation, Cyber Security Policies, Enterprise Security, Compliance Auditing, Security Strategy, Systems Administration, Operating System Administration, Governance, Security Controls, Organizational Strategy, Patch Management, Continuous Monitoring, Information Systems Security
- Status: Free Trial
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Security Controls, Vulnerability Assessments, Identity and Access Management, Asset Management
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Applied Machine Learning, Network Analysis, Data Analysis
- Status: Free
Coursera Project Network
Skills you'll gain: Linux Commands, Linux, TCP/IP, Scripting, Shell Script, Network Monitoring, Network Analysis, Network Security, Network Protocols
- Status: Free Trial
Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Scripting, Network Protocols, Authentications, Vulnerability Assessments, Python Programming, Data Access, System Monitoring, Automation
- Status: Free Trial
Infosec
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Exploit development, System Monitoring, Cybersecurity, Cyber Operations, Continuous Monitoring, Network Security, Network Monitoring, Python Programming, Scripting, Scripting Languages
Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Virtual Machines, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Command-Line Interface, Software Installation
- Status: NewStatus: Free Trial
EC-Council
Skills you'll gain: Cryptography, Encryption, Systems Development Life Cycle, Human Factors (Security), Security Awareness, Cybersecurity, Cyber Attacks, Cyber Security Policies, Threat Detection, ISO/IEC 27001, Security Controls, Computer Security, Infrastructure Security, Network Security, Vulnerability Assessments, Risk Management Framework, Information Systems, General Data Protection Regulation (GDPR)
In summary, here are 10 of our most popular cyber-risiko courses
- Vulnerabilidades y pruebas de penetración: Universidad de los Andes
- Execution, persistence, privilege escalation and evasion:Ā Infosec
- Managing Network Security:Ā Kennesaw State University
- Security Operations:Ā ISC2
- Planning, Auditing and Maintaining Enterprise Systems:Ā University of Colorado System
- Advanced Cybersecurity Concepts and Capstone Project:Ā Microsoft
- Intrusion Detection:Ā Johns Hopkins University
- Analyze Network Traffic with TCPDump: Build a Logging Tool:Ā Coursera Project Network
- Advanced Python Scripting for Cybersecurity:Ā Infosec
- Python for Active Defense:Ā Infosec