Filtern nach
BetreffErforderlich
SpracheErforderlich
Die im gesamten Kurs, sowohl für Anweisungen als auch Bewertungen, verwendete Sprache.
LernproduktErforderlich
NiveauErforderlich
DauerErforderlich
UntertitelErforderlich
LehrkraftErforderlich
Erkunden Sie den Cybersicherheits-Kurskatalog
- Status: Vorschau
West Virginia University
Kompetenzen, die Sie erwerben: Aufdeckung von Betrug, Anomalie-Erkennung, Finanzielle Rechnungsprüfung, Compliance-Berichterstattung, Cybersicherheit, Ethische Standards und Verhaltensweisen, Interne Kontrollen, Analytics, Datenanalyse-Software, Big Data, Nachforschungen, Buchhaltung
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Computer Security, IT Infrastructure, Operating System Administration, Network Security, Computer Networking, Desktop Support, Systems Administration, Network Troubleshooting, Remote Access Systems, Application Security, OSI Models, Package and Software Management, Disaster Recovery, Cybersecurity, User Accounts, File Systems, TCP/IP, Computer Hardware, Technical Support, Software Installation
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Cloud Management, Cloud Computing Architektur, Cloud-Technik, Cloud-Hosting, Hybrid-Cloud-Computing, Cloud-Lösungen, Cloud-Infrastruktur, Cloud-Plattformen, Virtuelle Maschinen, Cloud-Entwicklung, Cloud-natives Computing, Cloud-Speicher, Serverloses Rechnen, Cloud-Dienste, Aufkommende Technologien, Cloud Computing, Technische Dienste, Cloud-Sicherheit, DevOps, IBM Cloud
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Incident Response, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Detection, Vulnerability Assessments, Cyber Threat Hunting, Event Monitoring, Technical Communication, Cyber Security Policies, Vulnerability Management, Continuous Monitoring, Threat Management, Security Controls, Communication Strategies, Root Cause Analysis
- Status: Kostenloser Testzeitraum
Kennesaw State University
Kompetenzen, die Sie erwerben: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Threat Detection, Information Privacy, Safety and Security, Multi-Factor Authentication
- Status: Kostenloser Testzeitraum
New York University
Kompetenzen, die Sie erwerben: Cybersicherheit, Infrastruktur mit öffentlichem Schlüssel, Multi-Faktor-Authentifizierung, Netzwerksicherheit, Sicherheitskontrollen, Datenverschlüsselungsstandard, Authentifizierungen, Kryptographie, Computer Sicherheit, Verschlüsselung
- Status: Kostenloser Testzeitraum
Johns Hopkins University
Kompetenzen, die Sie erwerben: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
- Status: Neu
Kompetenzen, die Sie erwerben: Cybersecurity, TCP/IP, Cyber Attacks, Endpoint Security, Infrastructure Security, Network Routing, Threat Detection, Firewall, Computer Networking, Wireless Networks, Cloud Computing, Information Technology Infrastructure Library, Vulnerability Assessments
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Threat Modeling, Security Management, Risk Management, Disaster Recovery, Governance, Business Continuity, Application Security, Information Management, Risk Appetite, Security Controls, Continuous Monitoring, Configuration Management, Governance Risk Management and Compliance, Cybersecurity, Enterprise Security, Cloud Computing, Malware Protection, IT Management, Information Assurance, Test Planning
- Status: NeuStatus: Vorschau
Starweaver
Kompetenzen, die Sie erwerben: MITRE ATT&CK Framework, Cyber Operations, Threat Modeling, Cyber Security Strategy, Cyber Threat Intelligence, Penetration Testing, Cybersecurity, Exploitation techniques, Threat Detection, Vulnerability Assessments, Human Factors (Security), Security Awareness, Security Testing, Network Security, Generative AI
- Status: Kostenloser TestzeitraumStatus: KI-Fähigkeiten
Microsoft
Kompetenzen, die Sie erwerben: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Microsoft Office, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Generative AI, Operating Systems, Collaborative Software, System Support, Network Protocols, TCP/IP, Application Security, Microsoft Teams, Cloud Computing
- Status: Kostenloser TestzeitraumStatus: KI-Fähigkeiten
Microsoft
Kompetenzen, die Sie erwerben: Microsoft 365, Network Security, Cloud Management, Microsoft Azure, Business Software, Computer Hardware, Virtual Machines, Identity and Access Management, Cybersecurity, Network Troubleshooting, Microsoft Office, Desktop Support, Virtual Private Networks (VPN), Azure Active Directory, Technical Support, Hardware Troubleshooting, System Monitoring, Disaster Recovery, Cloud Computing, Network Protocols
Zusammenfassend finden Sie hier 10 unsere beliebtesten cybersecurity Kurse
- Forensic Accounting und Betrugsermittlung: West Virginia University
- Soporte de Tecnologías de la Información de Google: Google
- Einführung in Cloud Computing: IBM
- Cybersecurity Incident Response and Communication: Packt
- Cybersecurity: What to Do When You Are a Victim: Kennesaw State University
- Gegenmaßnahmen für Cyberangriffe: New York University
- Advanced Cybersecurity Techniques: Johns Hopkins University
- Palo Alto Networks Cybersecurity Fundamentals: Packt
- The Pearson Complete Course for CISM Certification: Pearson
- Offensive Cyber Operations: Starweaver