Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "jagd auf cyber-bedrohungen"
- Status: Preview
University of Zurich
Skills you'll gain: Finance, Financial Planning, Financial Market, Investments, Financial Analysis, Blockchain, Business Ethics, Behavioral Economics, Derivatives, Decision Making, Risk Management
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Incident Response, Contingency Planning, Disaster Recovery, Computer Security Incident Management, Security Management, Crisis Management, Cybersecurity, Business Continuity, Cyber Attacks, Risk Analysis, Business Risk Management, Data Management
- Status: Free Trial
University of Colorado System
Skills you'll gain: Contingency Planning, Disaster Recovery, Business Continuity Planning, Enterprise Application Management, Security Management, IT Management, System Monitoring, System Implementation, Cyber Security Policies, Enterprise Security, Compliance Auditing, Security Strategy, Systems Administration, Operating System Administration, Governance, Security Controls, Organizational Strategy, Patch Management, Continuous Monitoring, Information Systems Security
- Status: Free Trial
Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Content Creation, Media and Communications, Storytelling, Productivity, Digital Communications, Creativity, Web Content, Interpersonal Communications, Digital Design, Non-Verbal Communication, Personal Development, Conflict Management, Self-Awareness, Stress Management, Health Technology
- Status: Free Trial
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Data Security, Cloud Applications, Cloud Services, Application Security, Authorization (Computing), Cyber Risk, Secure Coding, Cloud Storage, Personally Identifiable Information, DevSecOps, General Data Protection Regulation (GDPR), Network Security, Information Privacy, Cloud Computing, Cybersecurity, Cryptography
- Status: Free Trial
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Security Controls, Vulnerability Assessments, Identity and Access Management, Asset Management
- Status: Free
Infosec
Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Security Management, Network Security, Security Information and Event Management (SIEM), Security Controls, Identity and Access Management, Cryptography, Threat Detection, Data Security, Computer Security, Encryption, Personally Identifiable Information, Data Governance, Firewall, Vulnerability Assessments, User Accounts, Authorization (Computing), Risk Management
- Status: Preview
Board Infinity
Skills you'll gain: Vulnerability Assessments, Cyber Security Assessment, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Command-Line Interface, Linux Commands, Network Troubleshooting, Cybersecurity, Linux, Software Installation, Intrusion Detection and Prevention, Network Security, Network Analysis
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Medical Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management, Security Awareness, Personally Identifiable Information, Encryption, Health Care, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Medical Records, Information Privacy, Cloud Computing, Patient Safety
- Status: Free Trial
Palo Alto Networks
Skills you'll gain: Cyber Operations, Cyber Threat Intelligence, Endpoint Security, Security Information and Event Management (SIEM), Continuous Monitoring, Threat Detection, Threat Management, Enterprise Security, Incident Response, Malware Protection, Automation, Artificial Intelligence
- Status: Free Trial
Technical University of Munich (TUM)
Skills you'll gain: Human Factors, Manufacturing Processes, Automation, Human Machine Interfaces, Cyber Engineering, Digital Transformation, Robotic Process Automation, Maintenance, Repair, and Facility Services, Product Lifecycle Management, Artificial Intelligence, Simulation and Simulation Software
University of Maryland, College Park
Skills you'll gain: Application Security, Secure Coding, Vulnerability Assessments, Security Software, Security Testing, Cybersecurity, Collaborative Software, Threat Modeling, Debugging, Systems Design
In summary, here are 10 of our most popular jagd auf cyber-bedrohungen courses
- Das liebe Geld - Finance im Alltag:Â University of Zurich
- Managing Cybersecurity Incidents and Disasters:Â Kennesaw State University
- Planning, Auditing and Maintaining Enterprise Systems:Â University of Colorado System
- Digital Intelligence for Everyone:Â Arizona State University
- Cybersecurity in the Cloud:Â University of Minnesota
- Advanced Cybersecurity Concepts and Capstone Project:Â Microsoft
- CompTIA Security+ 701:Â Infosec
- Kali Linux:Â Board Infinity
- Healthcare Data Security, Privacy, and Compliance:Â Johns Hopkins University
- Palo Alto Networks Security Operations Fundamentals:Â Palo Alto Networks