Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security"
- Status: Free
University of Illinois Urbana-Champaign
Skills you'll gain: Loss Prevention, Waste Minimization, Food and Beverage, Supply Chain Management, Market Dynamics, Economics, Capacity Planning, Stakeholder Management, Systems Thinking, International Relations, Education and Training, Innovation
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Data Storage Technologies, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Encryption, Key Management, Virtual Machines
Coursera Project Network
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Technical Communication
Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Wireless Networks
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Secure Coding, Authorization (Computing), Java, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
Skills you'll gain: Prompt Engineering, Microsoft Copilot, Regulation and Legal Compliance, Data Ethics, Generative AI, Data Governance, Customer Relationship Management (CRM) Software, Marketing Automation, Customer experience improvement, Microsoft 365, Compliance Training, Business Process Automation, Workflow Management, Compliance Management, Self Service Technologies, Sales Process, Sales Strategy, Microsoft Teams, Customer Service, Information Privacy
University of Michigan
Skills you'll gain: Augmented and Virtual Reality (AR/VR), Augmented Reality, Virtual Reality, Disabilities, Emerging Technologies, Virtual Environment, Design Thinking, Human Computer Interaction, User Experience Design, Data Ethics, Information Privacy, Diversity Equity and Inclusion Initiatives, Innovation, Ethical Standards And Conduct
- Status: New
Skills you'll gain: Identity and Access Management, Threat Detection, Encryption, Cybersecurity, Cyber Threat Intelligence, Intrusion Detection and Prevention, Network Security, Network Infrastructure, Email Security, Operating Systems, Malware Protection, System Monitoring, Incident Response, Anomaly Detection
Skills you'll gain: Microsoft Power Platform, Productivity Software, Data Integration, Data Modeling, Application Development, Business Intelligence, Self Service Technologies, Real Time Data, Data Security
Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Data Management, Digital Assets, Security Management, Threat Modeling, Vulnerability Assessments, Cybersecurity, Regulatory Compliance, Enterprise Security, Network Security, Data Security, Information Systems Security, Secure Coding, Key Management
Johns Hopkins University
Skills you'll gain: Clinical Data Management, Data Quality, Quality Assurance, Clinical Trials, Data Cleansing, Data Integrity, Data Governance, Microsoft Excel, Data Compilation, Data Collection, Data Sharing, Data Security, Patient Treatment
Microsoft
Skills you'll gain: Database Systems, Microsoft Azure, Databases, Relational Databases, MySQL, SQL, Database Management, Cloud Services, PostgreSQL, Data Storage Technologies, Data Security
In summary, here are 10 of our most popular cyber security courses
- Global Postharvest Loss Prevention: Fundamentals, Technologies, and Actors:Â University of Illinois Urbana-Champaign
- Security Best Practices in Google Cloud:Â Google Cloud
- Metasploit for Beginners: Ethical Penetration Testing:Â Coursera Project Network
- Introduction to IT Security:Â Akamai Technologies, Inc.
- Exploiting and Securing Vulnerabilities in Java Applications:Â University of California, Davis
- Microsoft Copilot: Your Everyday AI Companion:Â Microsoft
- Intro to AR/VR/MR/XR: Technologies, Applications & Issues:Â University of Michigan
- Cybersecurity Concepts:Â Packt
- Introduction to Microsoft Power Platform:Â Microsoft
- Certified Blockchain Security Professional (CBSP) Exam Prep:Â SkillUp EdTech