Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability assessment"
Skills you'll gain: Data Import/Export, C++ (Programming Language), Programming Principles, Data Structures, File Management, Computer Programming, Computer Science, Data Storage
University of Illinois Urbana-Champaign
Skills you'll gain: Education Software and Technology, Learning Theory, Instructional Design, Learning Management Systems, Technology Solutions, Disabilities, Human Computer Interaction, Technical Consulting, Technology Strategies, Emerging Technologies, Information Technology, Electronic Media, Innovation, Gerontology
University of Michigan
Skills you'll gain: Qualitative Research, Usability Testing, User Centered Design, Research Methodologies, Needs Assessment, Interviewing Skills, Research, Data Collection
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Threat Management, Threat Detection, Security Controls, Cyber Governance, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Data Management
Rutgers the State University of New Jersey
Skills you'll gain: Negotiation, Contract Negotiation, Procurement, Strategic Sourcing, Goal Setting, Communication, Business Research, Stakeholder Communications
Kennesaw State University
Skills you'll gain: Team Management, Team Building, Meeting Facilitation, Conflict Management, Team Leadership, Six Sigma Methodology, Discussion Facilitation, Project Management, Cross-Functional Collaboration, Innovation, Communication
Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Security Requirements Analysis, Penetration Testing, Information Systems Security, Human Factors (Security), Cybersecurity, Threat Detection, Cloud Security, Vulnerability Assessments, Threat Modeling, Encryption, Cyber Security Strategy, Vulnerability Management, Cyber Security Assessment, Risk Management Framework, Data Security
Universidad de los Andes
Skills you'll gain: User Feedback, Entrepreneurship, Business Development, New Business Development, Product Development, Customer Analysis, Business Planning, Market Opportunities, Product Design, Value Propositions, Needs Assessment, Customer Insights, Business Strategies, Product Testing
Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, Generative AI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Prompt Engineering, Natural Language Processing, Anomaly Detection, Vulnerability Management, Artificial Intelligence
University of Colorado System
Skills you'll gain: Trauma Care, Emergency Medicine, Emergency Medical Services, Medical Emergency, Patient Evaluation, Injury Prevention, Triage, Emergency Response, Mechanics, First Aid, Patient Positioning, Health Assessment, Vital Signs, Anatomy
National Academy of Sports Medicine
Skills you'll gain: Nutrition and Diet, Nutrition Education, Dietetics, Patient Education And Counseling, Clinical Nutrition, Food Quality Assurance And Control, Scientific Methods, Health Assessment, Food and Beverage, Regulatory Compliance, Preventative Care, Critical Thinking, Psychology, Medical Science and Research
In summary, here are 10 of our most popular vulnerability assessment courses
- C++ Basic Structures: Vectors, Pointers, Strings, and Files:Â Codio
- Learning Technologies Foundations and Applications:Â University of Illinois Urbana-Champaign
- Understanding User Needs:Â University of Michigan
- The Foundations of Cybersecurity:Â Kennesaw State University
- Security Operations:Â ISC2
- Procurement Negotiation:Â Rutgers the State University of New Jersey
- Team Management for the 6 σ Black Belt: Kennesaw State University
- Ciberseguridad:Â Universidad de los Andes
- ¿Cómo convertir mi idea en empresa?: Universidad de los Andes
- Generative AI: Boost Your Cybersecurity Career :Â IBM