Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security"
University of Colorado System
Skills you'll gain: Requirements Analysis, Security Requirements Analysis, Requirements Elicitation, Functional Requirement, Goal Setting, Unified Modeling Language, Meeting Facilitation, Conflict Management, User Story, Negotiation
Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Data Management, Digital Assets, Security Management, Threat Modeling, Vulnerability Assessments, Cybersecurity, Regulatory Compliance, Enterprise Security, Network Security, Data Security, Information Systems Security, Secure Coding, Key Management
Skills you'll gain: Microsoft SQL Servers, SQL, Database Design, Database Management, Stored Procedure, Relational Databases, Database Architecture and Administration, Query Languages, Data Integrity, Data Manipulation, Scripting, Authentications, User Accounts
Illinois Tech
Skills you'll gain: Linux, Cloud-Native Computing, Network Security, Linux Administration, Cloud Computing, Amazon Web Services, Infrastructure as Code (IaC), Cloud Computing Architecture, Network Troubleshooting, Cloud Storage, Linux Commands, Software-Defined Networking, User Accounts, Cloud Infrastructure, Network Monitoring, Command-Line Interface, Threat Modeling, TCP/IP, Systems Administration, Network Architecture
Microsoft
Skills you'll gain: Identity and Access Management, Azure Active Directory, Microsoft Azure, Network Troubleshooting, Hybrid Cloud Computing, Network Security, Network Administration, Windows PowerShell, Virtual Machines, Infrastructure as Code (IaC), Virtualization, Role-Based Access Control (RBAC), Cloud Security, Command-Line Interface
University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Cybersecurity, Intrusion Detection and Prevention, Encryption, Proxy Servers, Information Privacy, Web Servers, System Configuration, Cloud Hosting
Skills you'll gain: Threat Modeling, Risk Control, Vulnerability Assessments, Enterprise Architecture, Personally Identifiable Information, Risk Management Framework, Risk Management, IT Management, Risk Appetite, Compliance Reporting, Risk Mitigation, Risk Analysis, Business Continuity, Business Risk Management, Operational Risk, Information Privacy, Vulnerability Management, IT Security Architecture, Enterprise Risk Management (ERM), Information Assurance
Microsoft
Skills you'll gain: Microsoft Azure, Cloud Security, Data Security, Secure Coding, Network Security, Cloud Applications, Authorization (Computing), Role-Based Access Control (RBAC), Application Security, Microsoft SQL Servers, Web Applications, Cloud Development, Security Controls, Data Loss Prevention, Firewall, Relational Databases, Key Management, Threat Detection, Authentications, Encryption
- Status: New
Skills you'll gain: JUnit, Apache Maven, Spring Framework, Spring Boot, Build Tools, Restful API, Unit Testing, Hibernate (Java), Integration Testing, Gradle, Java, Object-Relational Mapping, Software Testing, Bootstrap (Front-End Framework), Database Management, UI Components, Web Applications, Application Programming Interface (API), Application Frameworks, Test Case
Fortinet, Inc.
Skills you'll gain: Network Administration, Network Troubleshooting, Network Infrastructure, System Configuration, Configuration Management, Network Security, Security Management, Network Planning And Design, Authentications, Scripting
University of Colorado System
Skills you'll gain: Software Design Documents, User Requirements Documents, Functional Requirement, Software Documentation, Unified Modeling Language, Functional Specification, Requirements Analysis, System Requirements, Systems Design, Technical Documentation, Data Modeling, Software Visualization, Systems Analysis, Dataflow
Duke University
Skills you'll gain: Data Pipelines, Rust (Programming Language), Restful API, Amazon Web Services, Data Structures, Secure Coding, Data Processing, Cloud Applications, Data Manipulation, Encryption, Algorithms
In summary, here are 10 of our most popular cyber security courses
- Requirements Specifications: Goals and Conflict Analysis:Â University of Colorado System
- Certified Blockchain Security Professional (CBSP) Exam Prep:Â SkillUp EdTech
- Microsoft SQL Server Development for Everyone:Â Packt
- Information Technology Fundamentals for Everyone:Â Illinois Tech
- Azure Identity and Networking Essentials:Â Microsoft
- Security and Privacy in TOR Network:Â University of Colorado System
- CRISC: Certified in Risk and Information Systems Control:Â Packt
- Secure your Cloud Data:Â Microsoft
- Learn Spring Boot in 100 Steps - Beginner to Expert:Â Packt
- FortiManager Administrator:Â Fortinet, Inc.