Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber operations"
- Status: Free
University of California, Santa Cruz
Skills you'll gain: Systems Design, Model Based Systems Engineering, Mathematical Modeling, Simulations, Embedded Systems, Computational Logic, Basic Electrical Systems, Digital Communications, Differential Equations, Estimation, Algorithms, Linear Algebra
Kennesaw State University
Skills you'll gain: Cybersecurity, Network Security, Disaster Recovery, Application Security, Computer Security, Cryptography, Cyber Risk, Encryption, Authorization (Computing), Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Governance, Cyber Security Policies, Infrastructure Security, Safety and Security, Identity and Access Management, Incident Management, Data Encryption Standard, Authentications
Skills you'll gain: Data Pipelines, Google Cloud Platform, Real Time Data, Data Lakes, MLOps (Machine Learning Operations), Dashboard, Data Warehousing, Extract, Transform, Load, Data Infrastructure, Cloud Infrastructure, Data Visualization, Cloud Storage, Big Data, Tensorflow, Unstructured Data, Data Integration, Data Processing, Data Visualization Software, Apache Hadoop, Applied Machine Learning
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Cyber Threat Intelligence, Threat Modeling, Malware Protection, Network Security, Infrastructure Security, Firewall, Security Awareness, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Vulnerability Assessments, Cloud Computing, System Configuration
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Cyber Operations, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Threat Management
Skills you'll gain: Threat Management, Cybersecurity, Cyber Risk, Computer Security Incident Management, Risk Management Framework, Risk Management, Incident Response, Security Information and Event Management (SIEM), Security Controls, Security Strategy, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), MITRE ATT&CK Framework, Auditing, Compliance Auditing
New York University
Skills you'll gain: Cyber Attacks, Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cybersecurity, IT Security Architecture, Cloud Security, NIST 800-53, Cyber Threat Intelligence, Hybrid Cloud Computing, Cloud Computing Architecture, Payment Card Industry (PCI) Data Security Standards, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Data Integrity
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Planning And Design, Network Architecture, General Networking, Network Performance Management, Computer Networking, Wireless Networks, Software-Defined Networking, Algorithms, System Programming, Data Integrity, Virtualization
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
Johns Hopkins University
Skills you'll gain: Clinical Trials, Clinical Research, Regulatory Compliance, Patient Safety, Risk Management, Science and Research, Medical Science and Research, Scientific Methods, Record Keeping
In summary, here are 10 of our most popular cyber operations courses
- Cyber-Physical Systems: Modeling and Simulation:Â University of California, Santa Cruz
- Cybersecurity and Its Ten Domains:Â Kennesaw State University
- Data Engineering, Big Data, and Machine Learning on GCP:Â Google Cloud
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks
- In the Trenches: Security Operations Center :Â EC-Council
- Play It Safe: Manage Security Risks:Â Google
- Enterprise and Infrastructure Security:Â New York University
- Cyber Attack Countermeasures:Â New York University
- Computer Communications:Â University of Colorado System
- Real-Time Cyber Threat Detection and Mitigation:Â New York University