Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber operations"
- Status: AI skills
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, Operating Systems, Network Protocols, TCP/IP, Application Security, Microsoft Teams, Productivity Software, Information Systems Security, Multi-Factor Authentication
Berklee
Skills you'll gain: Entrepreneurship, Contract Negotiation, Team Building, Design Thinking, Brand Strategy, Creativity, Ideation, Innovation, Creative Problem-Solving, Negotiation, Law, Regulation, and Compliance, Ethical Standards And Conduct, Revenue Management, Digital Assets, Business Management, Income Statement, Contract Review, Regulatory Compliance, Performance Analysis, Asset Protection
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Cyber Risk, Threat Detection, Security Controls, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Open Source Technology, Web Development Tools, Command-Line Interface, DevOps
Rutgers the State University of New Jersey
Skills you'll gain: Demand Planning, Forecasting, Supply Chain Planning, Sales Management, Time Series Analysis and Forecasting, Supply Chain Management, Estimation, Trend Analysis, Decision Making
University of Pennsylvania
Skills you'll gain: Branding, Logo Design, Brand Strategy, Brand Awareness, Brand Management, Packaging and Labeling, Asset Protection, Business Strategy, Strategic Planning, Product Knowledge, Regulation and Legal Compliance, Law, Regulation, and Compliance, Innovation, Creativity, Risk Management, Business Strategies, Competitive Analysis, Analysis, Writing, Economics
Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Cloud Services, Cloud Platforms, General Networking, Windows PowerShell, Cyber Governance, Unix Commands, Cyber Security Strategy
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Security Strategy, Risk Management Framework, Security Controls, Enterprise Security, Information Privacy
University of Colorado Boulder
Skills you'll gain: Theoretical Computer Science, Algorithms, Data Structures, Graph Theory, Operations Research, Public Key Cryptography Standards (PKCS), Computational Logic, Cryptography, Pseudocode, Design Strategies, Combinatorics, Computational Thinking, Programming Principles, Computer Science, Program Development, Encryption, Network Model, Linear Algebra, Analysis, Mathematical Modeling
Indian School of Business
Skills you'll gain: Financial Statements, Peer Review, Financial Statement Analysis, Financial Trading, Balance Sheet, Portfolio Management, Securities Trading, Financial Accounting, Income Statement, Data Collection, Market Liquidity, Investment Management, Financial Analysis, Performance Analysis, Financial Market, Market Dynamics, Project Design, Performance Measurement, Technical Analysis, Market Trend
- Status: Free
Universidad Nacional Autónoma de México
Skills you'll gain: Algebra, General Mathematics, Arithmetic, Geometry
LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Penetration Testing, Cloud Computing, Cybersecurity, Mobile Security, Application Security, Cyber Threat Intelligence, Virtualization, Encryption, Cryptography, Vulnerability Assessments, SQL
In summary, here are 10 of our most popular cyber operations courses
- Microsoft IT Support Specialist: Microsoft
- Music Business: Berklee
- The Foundations of Cybersecurity: Kennesaw State University
- Getting Started with Git and GitHub: IBM
- Supply Chain Planning: Rutgers the State University of New Jersey
- Intellectual Property Law: University of Pennsylvania
- Cybersecurity Foundations: Infosec
- The GRC Approach to Managing Cybersecurity: Kennesaw State University
- Foundations of Data Structures and Algorithms: University of Colorado Boulder
- Trading Strategies in Emerging Markets: Indian School of Business