Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability assessment"
University of London
Skills you'll gain: Network Security, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure
University of Colorado Boulder
Skills you'll gain: Community Organizing, Compassion, Community Development, Community Outreach, Needs Assessment, Program Evaluation, Empathy, Data Mapping, Teaching, Initiative and Leadership, Empowerment, Curriculum Planning, Working With Children, Collaboration, Student Engagement, Planning, Environmental Issue
- Status: Free
Coursera Instructor Network
Skills you'll gain: Customer Engagement, Customer Insights, Customer Analysis, Market Research, Surveys, Customer experience strategy (CX), Customer Service, Data Collection, Active Listening, Continuous Improvement Process, Data-Driven Decision-Making, Focus Group, Team Oriented, Social Media
Infosec
Skills you'll gain: Risk Management Framework, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cyber Risk, Security Management, Continuous Monitoring, Cyber Security Policies, Security Controls, Authorization (Computing), Information Privacy, Information Systems
Rutgers the State University of New Jersey
Skills you'll gain: Market Analysis, Supply Management, Supplier Management, Competitive Analysis, Strategic Sourcing, Financial Analysis, Procurement, Market Dynamics, Supply Chain Management, Risk Analysis, Competitive Intelligence, Trend Analysis, Business Strategy
Skills you'll gain: Malware Protection, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Network Analysis, Virtual Machines, Code Review, Debugging, System Programming, Microsoft Windows, Windows PowerShell, Programming Principles, Computer Architecture, Excel Macros, Linux
- Status: Free
Wesleyan University
Skills you'll gain: Mathematical Theory & Analysis, Algebra, Advanced Mathematics, Geometry, Calculus, Trigonometry, Graphing
- Status: Free
Universidad Nacional Autónoma de México
Skills you'll gain: Risk Management, Mitigation, Risk Mitigation, Business Risk Management, Risk Analysis, Decision Making, Policy Development, Governance, Vulnerability, Public Policies
Lund University
Skills you'll gain: Intellectual Property, Legal Writing, Law, Regulation, and Compliance, Case Law, Compliance Management, Business Strategy, Commercial Laws, Competitive Analysis, Mergers & Acquisitions, Advocacy, Brand Strategy, Procurement
- Status: Free
Universidad Nacional Autónoma de México
Skills you'll gain: Design Thinking, Student-Centred Learning, Education Software and Technology, Creative Thinking, Brainstorming, Creative Problem-Solving, Innovation, Human Centered Design, Problem Solving, Needs Assessment, Learning Strategies, Collaboration, Constructive Feedback, Empathy
University of Colorado Boulder
Skills you'll gain: Eclipse (Software), Integrated Development Environments, Computer Architecture, Hardware Architecture, Software Development, Embedded Systems, Debugging, Verification And Validation, System Design and Implementation, Simulations, System Configuration
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Threat Detection, Firewall, Cybersecurity, Geographic Information Systems
In summary, here are 10 of our most popular vulnerability assessment courses
- Introduction to Network Security:Â University of London
- Compassionate Leadership Through Service Learning with Jane Goodall and Roots & Shoots:Â University of Colorado Boulder
- Voice of the Customer (VoC): Enhancing Experiences :Â Coursera Instructor Network
- NIST DoD RMF:Â Infosec
- Supply Market Analysis:Â Rutgers the State University of New Jersey
- Malware Analysis and Introduction to Assembly Language:Â IBM
- Introduction to Complex Analysis:Â Wesleyan University
- Gestión integral del riesgo de desastres: Universidad Nacional Autónoma de México
- European Business Law: Competing in Europe:Â Lund University
- Innovar tu enseñanza con design thinking: Universidad Nacional Autónoma de México