Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security"
Duke University
Skills you'll gain: Blockchain, Loans, FinTech, Payment Systems, Key Management, Cryptography, Digital Assets, Market Liquidity, Financial Trading, Transaction Processing
- Status: Free
Skills you'll gain: Requirements Elicitation, Requirements Analysis, Business Requirements, Requirements Management, Business Analysis, Performance Improvement, Verification And Validation, Business Process Modeling, Stakeholder Engagement, User Story, Prioritization, Governance
Microsoft
Skills you'll gain: Virtual Private Networks (VPN), Cybersecurity, Multi-Factor Authentication, Authentications, Desktop Support, Information Systems Security, Network Security, Technical Support and Services, Information Privacy, Servers, Cloud Computing, Encryption, Identity and Access Management, Mac OS
Microsoft
Skills you'll gain: Database Systems, Microsoft Azure, Databases, Relational Databases, MySQL, SQL, Database Management, Cloud Services, PostgreSQL, Data Storage Technologies, Data Security
Coursera Project Network
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Technical Communication
Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Wireless Networks
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Data Storage Technologies, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Encryption, Key Management, Virtual Machines
Cisco Learning and Certifications
Skills you'll gain: File Systems, Endpoint Security, Linux, Microsoft Windows, Windows PowerShell, Linux Administration, Windows Servers, Operating Systems, Linux Commands, Network Administration, Active Directory, System Monitoring, System Configuration, Security Controls, Command-Line Interface, Service Management
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Secure Coding, Authorization (Computing), Java, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
- Status: New
Skills you'll gain: Identity and Access Management, Threat Detection, Encryption, Cybersecurity, Cyber Threat Intelligence, Intrusion Detection and Prevention, Network Security, Network Infrastructure, Email Security, Operating Systems, Malware Protection, System Monitoring, Incident Response, Anomaly Detection
Skills you'll gain: Prompt Engineering, Microsoft Copilot, Regulation and Legal Compliance, Data Ethics, Generative AI, Data Governance, Customer Relationship Management (CRM) Software, Marketing Automation, Microsoft 365, Customer experience improvement, Compliance Training, Business Process Automation, Workflow Management, Compliance Management, Self Service Technologies, Sales Process, Sales Strategy, Microsoft Teams, Customer Service, Information Privacy
Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Data Management, Digital Assets, Security Management, Threat Modeling, Vulnerability Assessments, Cybersecurity, Regulatory Compliance, Enterprise Security, Network Security, Data Security, Information Systems Security, Secure Coding, Key Management
In summary, here are 10 of our most popular cyber security courses
- Decentralized Finance (DeFi) Primitives: Duke University
- IIBA® Entry Certificate in Business Analysis™ (ECBA™) Exam Prep: Starweaver
- Cybersecurity and Privacy: Microsoft
- Microsoft Azure SQL: Microsoft
- Metasploit for Beginners: Ethical Penetration Testing: Coursera Project Network
- Introduction to IT Security: Akamai Technologies, Inc.
- Security Best Practices in Google Cloud: Google Cloud
- Endpoints and Systems: Cisco Learning and Certifications
- Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
- Cybersecurity Concepts: Packt