Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "jagd auf cyber-bedrohungen"
- Status: NewStatus: Free Trial
Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Security Management, Cyber Threat Hunting, Information Systems Security, Threat Detection, Data Security, Network Security, Application Security, Cyber Security Strategy, DevSecOps, Malware Protection, Cloud Security, Cyber Security Assessment, Risk Management Framework, Encryption, Authentications
- Status: NewStatus: Free Trial
Advancing Women in Tech
Skills you'll gain: ISO/IEC 27001, Budget Management, Cybersecurity, Cyber Governance, Cyber Security Strategy, Leadership Development, Cyber Risk, Security Management, Information Systems Security, Business Strategies, Strategic Leadership, Leadership and Management, Risk Management, Business Metrics, Vendor Management, Team Leadership, Compliance Auditing, Business Communication, Information Technology, Artificial Intelligence and Machine Learning (AI/ML)
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cyber Governance, Law, Regulation, and Compliance, Security Strategy, Culture Transformation, Enterprise Security, Cyber Operations, Communication, Business Risk Management, Business Leadership, Organizational Leadership, Leadership, Dashboard
- Status: NewStatus: Free Trial
Skills you'll gain: Computer Security Incident Management, Security Management, Data Security, Data Integrity
- Status: NewStatus: Free Trial
Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Vulnerability Assessments, Network Security, Network Monitoring, Bash (Scripting Language), Network Troubleshooting, Anomaly Detection, Cybersecurity, Vulnerability, Data Ethics, Network Analysis
- Status: Free Trial
LearnKartS
Skills you'll gain: Penetration Testing, Network Security, Application Security, Firewall, Hardening, Network Monitoring, Exploit development, Incident Response, Vulnerability Scanning, Security Controls, Virtualization, Exploitation techniques, Encryption, Solution Design, Internet Of Things, Cryptography, Web Servers, Network Analysis, SQL
What brings you to Coursera today?
- Status: Free Trial
Skills you'll gain: Penetration Testing, Network Security, Threat Modeling, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Cloud Computing, Encryption, Malware Protection, Intrusion Detection and Prevention, Identity and Access Management, Cyber Attacks, Data Integrity
- Status: NewStatus: Free
Skills you'll gain: Prompt Engineering, ChatGPT, Open Web Application Security Project (OWASP), Responsible AI, Penetration Testing, Threat Modeling, Cyber Operations, Exploitation techniques, Vulnerability Scanning, Generative AI, Scripting
- Status: NewStatus: Free Trial
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Threat Hunting, Cyber Security Strategy, Information Systems Security, Threat Detection, Network Security, Security Information and Event Management (SIEM), Security Management, MITRE ATT&CK Framework, Security Controls, Incident Response, Vulnerability Assessments, Cloud Security, Vulnerability Management, Vulnerability, Network Architecture, Encryption, Configuration Management
- Status: NewStatus: Free Trial
Skills you'll gain: Application Security, Cyber Security Strategy, Patch Management, Security Strategy
- Status: Free Trial
Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Fraud detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Security Strategy, Threat Modeling, Email Security, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
In summary, here are 10 of our most popular jagd auf cyber-bedrohungen courses
- CompTIA Cybersecurity Analyst (CySA+) CS0-003:Â Pearson
- Real-World Cybersecurity Leadership:Â Advancing Women in Tech
- Cyber Security: Essentials for Managers and Leaders:Â Macquarie University
- CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 3:Â Pearson
- IBM Ethical Hacking with Open Source Tools:Â IBM
- Certified Ethical Hacking (v12):Â LearnKartS
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- ChatGPT for Offensive Security:Â Infosec
- CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 1:Â Pearson
- CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 2:Â Pearson