Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber-risiko"
- Status: Preview
Starweaver
Skills you'll gain: Threat Modeling, Cyber Threat Intelligence, Vulnerability Management, Cybersecurity, Threat Detection, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Cyber Attacks, Cyber Operations, Patch Management, Continuous Monitoring, Configuration Management
Skills you'll gain: Exploit development, Test Tools, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Assessments, Web Development Tools, Application Security, Web Servers, Network Protocols, Web Applications, Proxy Servers, Automation
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Vulnerability Scanning, Wireless Networks, Splunk, Information Privacy
- Status: Preview
Rice University
Skills you'll gain: Cash Flows, Return On Investment, Finance, Business Valuation, Capital Budgeting, Financial Analysis, Financial Modeling, Investment Management, Financial Management, Financial Statements, Risk Analysis, Corporate Finance, Balance Sheet
University of Colorado Boulder
Skills you'll gain: Cyber Governance, Policy Analysis, Policy Development, Public Policies, Telecommunications, Network Infrastructure, Socioeconomics, Regulation and Legal Compliance, Economics, Technical Writing
- Status: Free
Google Cloud
Skills you'll gain: Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Intelligence, Cloud Security, Computer Security Incident Management, Google Cloud Platform, Network Security, System Monitoring, Cloud Computing
- Status: Free Trial
Skills you'll gain: Risk Management, Business Risk Management, Blockchain, Cyber Risk, Information Technology Architecture, Governance, Application Security, Technical Documentation, Solution Architecture, Cyber Governance, Regulation and Legal Compliance, Regulatory Requirements, Financial Regulations, Network Security, Data Governance, Emerging Technologies, Case Studies, Smart Goals
Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Vulnerability Scanning, Application Security, Exploitation techniques, Vulnerability Assessments, Data Security, Web Applications, SQL
- Status: Free Trial
Packt
Skills you'll gain: Incident Response, Disaster Recovery, Incident Management, Security Management, Cyber Operations, Business Continuity Planning, Safety and Security, Change Control, Threat Management, Security Information and Event Management (SIEM), Patch Management, Security Controls, Cybersecurity, Threat Detection, Intrusion Detection and Prevention, Hardening, Configuration Management, Continuous Monitoring, Vulnerability Management
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Network Security, Network Analysis, Cyber Security Assessment, Virtual Machines, Virtualization and Virtual Machines, Open Source Technology, Malware Protection, Linux, Microsoft Windows
Skills you'll gain: Vulnerability Assessments, Cyber Security Assessment, Network Security, Metasploit, Penetration Testing, Network Administration, Software Installation, System Configuration, Web Applications, Authentications, Linux, Configuration Management
- Status: Free Trial
Skills you'll gain: Risk Analysis, Risk Management, Incident Response, Business Continuity Planning, Security Management, Threat Modeling, Threat Management, Disaster Recovery, Vulnerability Assessments, Cyber Risk, Cyber Threat Intelligence, Continuous Monitoring, Cybersecurity, Vulnerability Management, Security Strategy, General Data Protection Regulation (GDPR)
In summary, here are 10 of our most popular cyber-risiko courses
- Deception As a Defense:Â Starweaver
- Burp Suite Unfiltered - Go from a Beginner to Advanced:Â Packt
- Advanced Network Security and Analysis:Â Johns Hopkins University
- Finanzen für Nicht-Finanzfachleute: Rice University
- When to Regulate? The Digital Divide and Net Neutrality:Â University of Colorado Boulder
- Chronicle SIEM: Outcomes & Functions:Â Google Cloud
- Blockchain Architecture - Intermediate Concepts :Â LearnQuest
- Web Hacker's Toolbox - Tools Used by Successful Hackers:Â Packt
- Security Operations:Â Packt
- Digital Forensics for Pentesters - Hands-On Learning:Â Packt