Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "jagd auf cyber-bedrohungen"
- Status: Free Trial
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Stakeholder Communications, Vulnerability Assessments, Threat Detection, Hardening, Network Security, Security Controls, Threat Management, Security Information and Event Management (SIEM), TCP/IP, Risk Management Framework, Linux, Debugging, Cybersecurity, SQL
Coursera Project Network
Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation
- Status: Free Trial
Vanderbilt University
Skills you'll gain: Prompt Engineering, ChatGPT, Prompt Patterns, Generative AI, Crisis Management, LLM Application, Productivity, Incident Response, Responsible AI, OpenAI, AI Personalization, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Large Language Modeling, Business Ethics, Information Privacy, Threat Modeling, Cybersecurity
- Status: Free Trial
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), Git (Version Control System)
- Status: Free Trial
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols
- Status: Free Trial
Skills you'll gain: Debugging, Python Programming, Cybersecurity, Scripting, Programming Principles, Data Import/Export, Algorithms, Automation, Computer Programming, File Management
- Status: Free Trial
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Detection, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Splunk, Network Analysis, Network Protocols, Technical Documentation, Query Languages
- Status: Free Trial
Vanderbilt University
Skills you'll gain: Crisis Management, Incident Response, ChatGPT, Computer Security Incident Management, Generative AI, Cross-Functional Collaboration, Incident Management, Prompt Engineering, Threat Modeling, Cybersecurity, Team Performance Management, Scenario Testing, Hardening, Complex Problem Solving, Discussion Facilitation, Artificial Intelligence, Performance Analysis, Coordination
- Status: Free Trial
Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Exploit development, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Secure Coding, Threat Modeling, Web Applications, Cloud Security, Internet Of Things
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Computer Security Awareness Training, Personally Identifiable Information, Information Privacy, Emerging Technologies
Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Security Testing, Cybersecurity, Virtual Machines, Technical Writing, Web Servers, Linux
In summary, here are 10 of our most popular jagd auf cyber-bedrohungen courses
- Cybersécurité Google: Google
- Metasploit for Beginners: Ethical Penetration Testing: Coursera Project Network
- Generative AI Cybersecurity & Privacy for Leaders: Vanderbilt University
- Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
- System Hacking, Malware Threats, and Network Attacks: Packt
- Automate Cybersecurity Tasks with Python: Google
- Sound the Alarm: Detection and Response: Google
- ChatGPT + Cybersecurity: AI-Powered Tabletops & Training: Vanderbilt University
- Advanced Network Attacks, Web Hacking, and Cryptography: Packt
- Cybersecurity: Protecting your Information on the Go: Kennesaw State University