Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "endpunkt-sicherheit"
- Status: NewStatus: Free Trial
Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Vulnerability Assessments, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Network Troubleshooting, Anomaly Detection, Cyber Attacks, Computer Security, Network Analysis
- Status: Free Trial
LearnKartS
Skills you'll gain: Penetration Testing, Network Security, Application Security, Firewall, Hardening, Network Monitoring, Exploit development, Incident Response, Vulnerability Scanning, Security Controls, Virtualization, Exploitation techniques, Encryption, Solution Design, Internet Of Things, Cryptography, Web Servers, Network Analysis, SQL
- Status: NewStatus: Preview
Coursera Instructor Network
Skills you'll gain: Open Web Application Security Project (OWASP), DevSecOps, Jenkins, Software Development Life Cycle, CI/CD, Application Security, Secure Coding, Continuous Integration, DevOps, Continuous Delivery, Vulnerability Scanning, Vulnerability Assessments, Software Quality Assurance, Security Awareness, Dependency Analysis, Compliance Management, Automation
- Status: NewStatus: Free Trial
Skills you'll gain: Kubernetes, Application Security, Containerization, Threat Detection, Encryption, Infrastructure Security, Security Engineering, API Gateway, Network Security, Hardening, Scenario Testing, Continuous Monitoring, Authorization (Computing), Authentications
- Status: New
Skills you'll gain: Security Strategy, Responsible AI, Risking, Law, Regulation, and Compliance, Personally Identifiable Information, Threat Modeling, Data Security, Security Management, Information Assurance, Infrastructure Security, Cybersecurity, Artificial Intelligence
- Status: NewStatus: Free Trial
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security, SQL
What brings you to Coursera today?
- Status: NewStatus: Free Trial
Skills you'll gain: Cryptography, Encryption, Cloud Security, Cyber Security Assessment, Cloud Computing, Advanced Encryption Standard (AES), Data Security, Public Key Infrastructure
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Malware Protection, Cyber Security Assessment, Threat Detection, Penetration Testing, Threat Management, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
- Status: NewStatus: Free Trial
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, LangChain, Threat Detection, Responsible AI, Large Language Modeling, Continuous Monitoring, Information Systems Security, Generative AI, Vulnerability Assessments, Incident Response, LangGraph, Prompt Engineering, Security Strategy, Artificial Intelligence
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Network Security, Network Analysis, Network Protocols, Open Source Technology
- Status: NewStatus: Free Trial
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security), Network Analysis
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Cybersecurity, Information Systems Security Assessment Framework (ISSAF), Cyber Security Strategy, Vulnerability Assessments, Cyber Threat Intelligence, Threat Modeling, Exploitation techniques, Cyber Security Policies, Computer Security, Security Controls, Data Security
In summary, here are 10 of our most popular endpunkt-sicherheit courses
- IBM Ethical Hacking with Open Source Tools:Â IBM
- Certified Ethical Hacking (v12):Â LearnKartS
- Secure Coding: SSDLC, OWASP & SonarQube Essentials:Â Coursera Instructor Network
- Certified Kubernetes Security Specialist (CKS): Unit 8:Â Pearson
- Einführung in Sicherheitskonzepte in der Welt der KI: Google Cloud
- Certified Ethical Hacker (CEH): Unit 5:Â Pearson
- Certified Ethical Hacker (CEH): Unit 7:Â Pearson
- Certified Ethical Hacker (CEH): Unit 3:Â Pearson
- Certified Ethical Hacker (CEH): Unit 8:Â Pearson
- Certified Ethical Hacker (CEH): Unit 2:Â Pearson