Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "jagd auf cyber-bedrohungen"
- Status: Free Trial
Skills you'll gain: Project Closure, Quality Management, Continuous Improvement Process, Project Risk Management, Cost Management, Backlogs, Quality Improvement, Project Planning, Risk Management, Milestones (Project Management), Communication Planning, Sprint Retrospectives, Agile Project Management, Scope Management, Stakeholder Management, Project Management Life Cycle, Project Documentation, Project Management, Agile Methodology, Change Management
- Status: Free Trial
Skills you'll gain: Data Cleansing, Stakeholder Management, Rmarkdown, Data Presentation, Data Storytelling, Data Visualization, Data Validation, Data Literacy, Ggplot2, Data Ethics, Data-Driven Decision-Making, Interactive Data Visualization, Analytical Skills, Data Integrity, Dashboard, Data Visualization Software, Tableau Software, Case Studies, Spreadsheet Software, Data Analysis
- Status: Free Trial
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Exploit development, Security Strategy, Threat Modeling, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection
- Status: Free Trial
Skills you'll gain: Cryptography, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Threat Modeling, Simple Object Access Protocol (SOAP), TCP/IP, Restful API, Information Privacy, OSI Models
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Cyber Threat Intelligence, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Threat Modeling
- Status: Preview
Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Computer Security Incident Management, Incident Response, Security Controls, Network Security, Encryption
- Status: Free Trial
L&T EduTech
Skills you'll gain: Embedded Systems, Embedded Software, Control Systems, Programmable Logic Controllers, Cyber Engineering, Internet Of Things, C (Programming Language), Automation, Computer Engineering, Electronic Systems, Simulation and Simulation Software, Integration Testing, Cloud Computing, Matlab
- Status: Free Trial
University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, TCP/IP, Network Analysis
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Testing, Cyber Attacks, MITRE ATT&CK Framework, Exploit development, Encryption, Vulnerability Scanning, Web Applications, Infrastructure Security, Wireless Networks, Internet Of Things
- Status: Free Trial
Skills you'll gain: Embedded Systems, Embedded Software, Computer Systems, Internet Of Things, System Programming, C (Programming Language), Hardware Architecture, Peripheral Devices, Wireless Networks, Computer Architecture, Cybersecurity, Cloud Computing, Development Environment, Debugging
Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Virtual Machines, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Command-Line Interface, Software Installation
- Status: Free Trial
Skills you'll gain: Intrusion Detection and Prevention, Computer Security Incident Management, Cyber Threat Hunting, Cyber Attacks, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Security Controls, Threat Management, System Monitoring, IT Automation, Record Keeping, Problem Management
In summary, here are 10 of our most popular jagd auf cyber-bedrohungen courses
- Google Project Management (DE):Â Google
- Google Data Analytics (DE):Â Google
- Proactive Computer Security:Â University of Colorado System
- Web Connectivity and Security in Embedded Systems:Â EIT Digital
- Cybersecurity Risk Management Frameworks:Â Kennesaw State University
- Practice Exam for ISC2 Certified in Cybersecurity (CC):Â SkillUp
- CPS solution for Industries:Â L&T EduTech
- Introduction to Computer Security:Â University of London
- Ethical Hacking Essentials: Hands-On Edition:Â EC-Council
- Design of CPS with ARM processor using Embedded C:Â L&T EduTech