Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security assessment"
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Linux, Vulnerability Management, Threat Detection, Vulnerability Scanning, Vulnerability Assessments, Anomaly Detection, Network Security, Bash (Scripting Language), Network Monitoring, Threat Management, Scripting, Cyber Security Assessment, Cyber Threat Intelligence, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Data Ethics, Incident Response, Security Strategy, Information Systems Security
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Cleansing, Data Management, Data Validation, Data Quality, Data Integrity, Technical Communication, Automation, Requirements Analysis, Machine Learning
- Status: Free Trial
Skills you'll gain: Hardware Troubleshooting, Network Security, General Networking, Network Administration, Infrastructure Security, Network Troubleshooting, Technical Support, Computer Networking, Mobile Security, Desktop Support, System Support, Computer Hardware, Technical Services, Information Technology, Operating Systems, Mac OS, Virtualization, Microsoft Windows, Unix, Simulations
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Risk Management Framework, Risk Mitigation, Vulnerability Assessments, Asset Management, Cyber Security Assessment, Security Controls
- Status: Free Trial
Fortinet, Inc.
Skills you'll gain: Virtual Private Networks (VPN), Firewall, Network Routing, Intrusion Detection and Prevention, Authentications, Network Security, Network Administration, Security Controls, User Accounts, System Configuration, Network Monitoring, Web Servers
Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Cybersecurity, Investigation, Event Monitoring, Threat Detection, Risk Management, Communication Strategies
- Status: Free Trial
Skills you'll gain: Cybersecurity, Cloud Computing, Network Monitoring, Command-Line Interface, General Networking, Linux, Windows PowerShell, Virtual Machines
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Six Sigma Methodology, Lean Six Sigma, Analysis, Process Improvement, Project Documentation, Quality Improvement, Process Capability, Customer Analysis, Continuous Quality Improvement (CQI), Project Management, Business Process
- Status: Free Trial
University of Michigan
Skills you'll gain: Generative AI, Data Ethics, Artificial Intelligence, Operational Risk, Strategic Thinking, AI Personalization, Automation, Legal Risk, Business, Governance, Social Studies, Data Security, Natural Language Processing, Data Quality
- Status: NewStatus: Free Trial
Microsoft
Skills you'll gain: Microsoft Azure, Cloud Management, Cloud Computing, Cloud Computing Architecture, Infrastructure As A Service (IaaS), Cloud Services, Infrastructure as Code (IaC), Virtual Machines, System Monitoring, Cloud Security, Scalability
- Status: Free Trial
Skills you'll gain: Cybersecurity, Cyber Operations, Cyber Threat Hunting, Intrusion Detection and Prevention, Scripting, Python Programming, Authorization (Computing), Command-Line Interface, Operating Systems
- Status: Free Trial
Skills you'll gain: Microsoft Azure, MLOps (Machine Learning Operations), Databricks, Cloud Computing, Applied Machine Learning, Data Ethics, Data Pipelines, Machine Learning, Tensorflow, Continuous Monitoring, Scalability
In summary, here are 10 of our most popular cyber security assessment courses
- IBM Ethical Hacking with Open Source Tools:Â IBM
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Practice Exams for CompTIA A+ Certification: Core 1 & Core 2:Â IBM
- Introduction to Risk Management:Â University of California, Irvine
- FortiGate Administrator:Â Fortinet, Inc.
- Incident Response and Recovery:Â ISC2
- Introduction to Cybersecurity Foundations:Â Infosec
- The Define Phase for the 6 σ Black Belt: Kennesaw State University
- Generative AI: Fundamentals, Applications, and Challenges:Â University of Michigan
- Essentials with Azure Fundamentals:Â Microsoft