Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability assessment"
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Firewall, Security Controls, Endpoint Security, Threat Detection, Virtual Machines, Encryption
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Penetration Testing, Vulnerability Assessments, Data Security, Security Controls, Authentications, Vulnerability Management, Web Applications, Javascript
- Status: New AI skills
Skills you'll gain: Quality Management, Project Management Life Cycle, Project Scoping, Project Closure, Project Management, Project Planning, Continuous Improvement Process, Agile Project Management, Project Controls, Backlogs, Quality Assessment, Team Management, Project Documentation, Agile Methodology, Communication Planning, Project Schedules, Change Management, Milestones (Project Management), Organizational Structure, Data Storytelling
- Status: New AI skills
Google
Skills you'll gain: Threat Modeling, Network Security, Threat Management, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Attacks, Cybersecurity, Network Protocols, Cloud Security, Vulnerability Assessments, Network Architecture, Bash (Scripting Language), Operating Systems, Security Controls, Debugging, Python Programming
University of Michigan
Skills you'll gain: Product Lifecycle Management, Product Development, Product Improvement, Sustainability Reporting, Environmental Engineering, Product Design, Environmental Management Systems, Environment, Simulation and Simulation Software, Analysis, Data Collection
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Code Review, Vulnerability Scanning, Vulnerability Assessments
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Prompt Engineering, ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Large Language Modeling, Artificial Intelligence, Natural Language Processing, Program Development, Anomaly Detection, Vulnerability Management, Image Analysis, Content Creation, Virtual Environment
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption
Skills you'll gain: Data Ethics, Data Analysis, Data-Driven Decision-Making, Google Sheets, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Visualization Software, SQL, Data Management
DeepLearning.AI
Skills you'll gain: Data Ethics, Market Opportunities, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Team Building, Machine Learning, Strategic Thinking, Data Science, Needs Assessment, Deep Learning, Business Ethics, Artificial Neural Networks, Engineering Management
- Status: Free
University of Pennsylvania
Skills you'll gain: Vital Signs, Respiration, Pulmonology, Health Assessment, Cardiology, Systems Of Measurement, Neurology, Patient Evaluation, Anatomy, Biology
In summary, here are 10 of our most popular vulnerability assessment courses
- Cybersecurity Solutions and Microsoft Defender:Â Microsoft
- Identifying Security Vulnerabilities:Â University of California, Davis
- Google Project Management::Â Google
- Google Cybersecurity:Â Google
- Life Cycle Assessment:Â University of Michigan
- Security Analyst Fundamentals:Â IBM
- IBM Cybersecurity Analyst:Â IBM
- IBM Generative AI for Cybersecurity Professionals:Â IBM
- Assets, Threats, and Vulnerabilities:Â Google
- Foundations: Data, Data, Everywhere:Â Google