Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber operations"
- Status: Free
Insper
Skills you'll gain: Operations Management, Quality Management, Process Management, Business Operations, Inventory Management System, Manufacturing Operations, Operational Analysis, Process Analysis, Production Management, Operational Efficiency, Six Sigma Methodology, Performance Measurement, Business Strategy
Coursera Project Network
Skills you'll gain: Investment Management, Risk Management, Financial Analysis, Risk Analysis, Portfolio Management, Financial Market, Investments, Return On Investment, Performance Measurement
University of Pennsylvania
Skills you'll gain: Compliance Management, Law, Regulation, and Compliance, Compliance Auditing, Business Ethics, Internal Controls, Risk Analysis, Financial Controls, Risk Management Framework, Due Diligence, Employee Training, Policy Development, International Relations
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, HTML and CSS, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Responsive Web Design, Hypertext Markup Language (HTML), Application Development, Remote Access Systems, Scripting, MySQL
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cyber Threat Intelligence, Threat Detection, Cybersecurity, Network Security, Data Security, Network Analysis, Malware Protection, Operating Systems
Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Cyber Threat Hunting, Penetration Testing, Anomaly Detection, Scripting, Command-Line Interface, Vulnerability Assessments, Python Programming, Data Access, System Monitoring, User Accounts, Scripting Languages, System Programming
University of California San Diego
Skills you'll gain: Graph Theory, Combinatorics, Network Analysis, Data Structures, Network Routing, Algorithms, Theoretical Computer Science, Operations Research
- Status: Free
ESSEC Business School
Skills you'll gain: Operational Excellence, Operational Efficiency, Operations Management, Kaizen Methodology, Business Operations, Process Improvement, Quality Improvement, Lean Methodologies, Business Process Improvement, Continuous Improvement Process, Kanban Principles, Six Sigma Methodology, Complex Problem Solving, Performance Management, Waste Minimization
- Status: Free
Eindhoven University of Technology
Skills you'll gain: Business Process, Process Analysis, Process Improvement, Business Process Management, Data Mining, Business Process Modeling, Process Optimization, Operational Analysis, Performance Analysis, Data Analysis, Real Time Data, Data Science, Verification And Validation
- Status: Free
Universidad Nacional Autónoma de México
Skills you'll gain: Systems Thinking, Computational Thinking, Systems Analysis, Critical Thinking and Problem Solving, Concept Of Operations, Network Analysis, Social Studies, Network Model, Simulation and Simulation Software
New York University
Skills you'll gain: Cyber Attacks, Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cybersecurity, IT Security Architecture, Cloud Security, NIST 800-53, Cyber Threat Intelligence, Hybrid Cloud Computing, Cloud Computing Architecture, Payment Card Industry (PCI) Data Security Standards, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Data Integrity
In summary, here are 10 of our most popular cyber operations courses
- Gestão de Operações: Insper
- Investment Risk Management: Coursera Project Network
- What is Corruption: Anti-Corruption and Compliance: University of Pennsylvania
- Akamai Customer Consulting and Support: Akamai Technologies, Inc.
- Technical Deep Dive with Incident Response Tools: Infosec
- Advanced Python Scripting for Cybersecurity: Infosec
- Introduction to Graph Theory: University of California San Diego
- L'excellence opérationnelle en pratique : ESSEC Business School
- Introduction to Technical Support : IBM
- Process Mining: Data science in Action: Eindhoven University of Technology