Filtern nach
BetreffErforderlich
SpracheErforderlich
Die im gesamten Kurs, sowohl für Anweisungen als auch Bewertungen, verwendete Sprache.
LernproduktErforderlich
NiveauErforderlich
DauerErforderlich
UntertitelErforderlich
LehrkraftErforderlich
Erkunden Sie den Informationstechnologie-Kurskatalog
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Vulnerability Assessments, Vulnerability Management, Malware Protection, Cyber Security Assessment, Threat Detection, Penetration Testing, Threat Management, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Cybersecurity, Application Security, Data Security, Cryptography, Authentications, Data Structures, Data Integrity, Artificial Intelligence
- Status: NeuStatus: Vorschau
University of Washington
Kompetenzen, die Sie erwerben: Power BI, Data Modeling, Data Transformation, Business Requirements, Star Schema, Data Visualization Software, Extract, Transform, Load, Snowflake Schema, Relational Databases, Data Integration, Database Design, Data Import/Export, Data Cleansing, Business Intelligence, Data Analysis, Stakeholder Management, Decision Making
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Network Security, OSI Models, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, TCP/IP, Network Administration, Wireless Networks, Network Protocols, General Networking, Intrusion Detection and Prevention, Local Area Networks, Network Routers, Security Controls, Mobile Security, Authentications, Authorization (Computing)
- Status: Neu
Kompetenzen, die Sie erwerben: Threat Modeling, Threat Detection, MITRE ATT&CK Framework, Security Testing, Application Security, Security Engineering, Cyber Security Strategy, Cybersecurity, Cyber Security Assessment, Vulnerability Assessments, DevSecOps, Risk Management Framework, Open Web Application Security Project (OWASP), Software Development Life Cycle, Cloud Security
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Java, Transaction Processing, Java Programming, Data Access, Object Oriented Design, Dataflow, Database Management, Stored Procedure, SQL, Integration Testing, Application Development, Information Management, Object-Relational Mapping, Command-Line Interface, Application Deployment, Data Integrity, OS Process Management, Functional Design, Application Programming Interface (API), Mitigation
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Kubernetes, Cloud-Native Computing, Network Security, Role-Based Access Control (RBAC), Containerization, Security Controls, YAML, General Networking
- Status: NeuStatus: Vorschau
Jordan University of Science and Technology
Kompetenzen, die Sie erwerben: Immunology, Public Health and Disease Prevention, Laboratory Testing, Diagnostic Tests, Public Health, Pathology, Infectious Diseases, Physiology, General Medicine, Internal Medicine, Hematology, Microbiology, Medical Terminology, Cell Biology, Oncology, Molecular Biology
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Apache, File Transfer Protocol (FTP), Linux Servers, Linux Administration, Linux, Web Servers, Remote Access Systems, Command-Line Interface, Unix Commands, File Management, Network Protocols, Network Performance Management, Security Controls
- Status: Neu
Kompetenzen, die Sie erwerben: Operating System Administration, TCP/IP, Security Controls, Service Management, File Management, SQL, User Accounts
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Cybersecurity, Cyber Threat Intelligence, Network Security, Cyber Security Strategy, Data Security, Security Controls, Continuous Monitoring, Threat Management, Security Strategy, Incident Response, Vulnerability Assessments, Systems Architecture, Risk Management Framework
- Status: NeuStatus: Kostenloser Testzeitraum
Birla Institute of Technology & Science, Pilani
Kompetenzen, die Sie erwerben: Computational Logic, Logical Reasoning, Deductive Reasoning, Analytical Skills, Theoretical Computer Science, Computational Thinking, Computer Science, Data Analysis, Computer Programming, Verification And Validation, Algorithms, Program Development, Software Development, Machine Learning
Zusammenfassend finden Sie hier 10 unsere beliebtesten information technology Kurse
- Certified Ethical Hacker (CEH): Unit 3: Pearson
- Cyber Security Hashing Training for Beginners: Simplilearn
- Power BI Basics: Requirements to Visualizations : University of Washington
- (SSCP) Systems Security Certified Practitioner: Unit 5: Pearson
- Modelling Threats - Strategies in Threat Modelling: Packt
- Java SE 17 Developer (1Z0-829): Pearson
- Kubernetes From Basics to Guru: Unit 4: Pearson
- Immunology for all: Jordan University of Science and Technology
- Linux Networking - Basics and Beyond: Unit 4: Pearson
- Becoming a Linux Server Admin: Packt