Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber operations"
Johns Hopkins University
Skills you'll gain: Data Visualization, Network Analysis, Relational Databases, Data Visualization Software, Data Analysis, Data Manipulation, Social Sciences, Algebra, Human Factors, Innovation
Skills you'll gain: Application Security, Security Testing, Software Testing, Cyber Security Assessment, Cryptography, Penetration Testing, Encryption, Authentications, Identity and Access Management, Business Logic, Test Case, Vulnerability Assessments, Web Servers, Data Validation, Network Protocols
Skills you'll gain: Open Web Application Security Project (OWASP), Application Security, Threat Modeling, Secure Coding, DevSecOps, Encryption, Security Engineering, Security Testing, Security Software, Cryptography, Threat Management, Cloud Security, Risk Management Framework, DevOps, Cyber Engineering, Cloud API, Vulnerability Scanning, Security Management, Data Security, Threat Detection
- Status: New
Skills you'll gain: Linux, Linux Administration, File Systems, Linux Commands, User Accounts, Command-Line Interface, File Management, Systems Administration, Operating Systems, Identity and Access Management, Virtualization, Authorization (Computing), Software Installation, Virtual Machines, System Configuration, Open Source Technology
Starweaver
Skills you'll gain: Lean Manufacturing, Manufacturing and Production, Manufacturing Processes, Production Management, Quality Management, Emerging Technologies, Strategic Leadership, Operational Efficiency, Big Data, Process Optimization, Business Technologies, Internet Of Things, Data-Driven Decision-Making, Automation, Waste Minimization, Supply Chain, Corporate Sustainability, Innovation, Digital Transformation, Robotic Process Automation
- Status: New
University of Colorado Boulder
Skills you'll gain: Environmental Social And Corporate Governance (ESG), Corporate Sustainability, Sustainability Reporting, Business Ethics, Supplier Relationship Management, Strategic Sourcing, Supply Chain Management, Labor Compliance, Procurement, Leadership, Corporate Strategy, Ethical Standards And Conduct, Compliance Management, Waste Minimization, Environment and Resource Management, Product Lifecycle Management, Product Design, Stakeholder Engagement, Cross-Functional Collaboration
Skills you'll gain: Cryptography, ASP.NET, Encryption, Open Web Application Security Project (OWASP), .NET Framework, Secure Coding, Data Security, Authentications, Application Security, Vulnerability Assessments, Security Engineering, Threat Modeling, Data Access, Security Controls, Identity and Access Management, C# (Programming Language), Web Applications, Development Environment, Cross Platform Development
Skills you'll gain: Incident Response, IT Security Architecture, Identity and Access Management, Continuous Monitoring, Network Security, Security Awareness, Information Systems Security, Security Information and Event Management (SIEM), Application Security, Disaster Recovery, Security Controls, Cloud Security, Cyber Security Strategy, Threat Detection, Cyber Governance, Risk Management Framework, Authentications
Skills you'll gain: Root Cause Analysis, Six Sigma Methodology, Lean Six Sigma, Statistical Process Controls, Minitab, Waste Minimization, Data-Driven Decision-Making, Kaizen Methodology, Process Improvement, Solution Design, Project Management, Process Capability, Lean Manufacturing, Process Mapping, Sampling (Statistics), Brainstorming, Requirements Analysis, Customer Analysis, Histogram
- Status: New
Skills you'll gain: Network Security, Network Administration, General Networking, Computer Networking, Network Monitoring, Computer Security, Wireless Networks, Network Infrastructure, Threat Modeling, Cybersecurity, Authentications, Disaster Recovery, Network Performance Management, Cryptography, Network Switches, Cyber Security Policies, Encryption
Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Cloud Infrastructure, Cloud Services, Cloud Management, Cloud Computing, Cloud Platforms, Disaster Recovery, Cloud Computing Architecture, DevOps, Cloud-Native Computing, Amazon Web Services, Virtualization, Cloud Applications, Serverless Computing, Cloud Security, Continuous Integration, Virtual Machines, Business Continuity, Cost Management
- Status: New
Skills you'll gain: Microsoft SQL Servers, Transact-SQL, SQL, Database Design, Transaction Processing, Stored Procedure, Data Manipulation, Query Languages, Database Management, Databases, Database Architecture and Administration, Relational Databases, Data Integrity, Performance Tuning
In summary, here are 10 of our most popular cyber operations courses
- Network Visualization and Intervention:Â Johns Hopkins University
- Software Security Testing:Â Packt
- Fundamentals of Secure Software:Â Packt
- Linux Foundations and Basic System Administration:Â Packt
- Future of Production:Â Starweaver
- Impacts of Sustainable Operations and Supply Chains:Â University of Colorado Boulder
- Writing Secure Code in ASP.NET:Â Packt
- Managing Information System Security Architecture:Â LearnQuest
- Certified Six Sigma Yellow Belt Training:Â Packt
- Network Implementations and Operations:Â Packt