Filtern nach
BetreffErforderlich
SpracheErforderlich
Die im gesamten Kurs, sowohl für Anweisungen als auch Bewertungen, verwendete Sprache.
LernproduktErforderlich
NiveauErforderlich
DauerErforderlich
UntertitelErforderlich
LehrkraftErforderlich
Erkunden Sie den Cybersicherheits-Kurskatalog
Kompetenzen, die Sie erwerben: Software Testing, Business Logic, Secure Coding, Cryptography, Cybersecurity, Identity and Access Management, Authentications, Vulnerability Assessments, Encryption, Data Validation, Network Protocols, Authorization (Computing), Web Applications
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Threat Modeling, IT Security Architecture, Secure Coding, Application Security, Security Testing, Security Strategy, Security Requirements Analysis, Solution Architecture, Software Development Methodologies, Software Development Life Cycle, Systems Architecture, Penetration Testing, Business Risk Management, Compliance Management
- Status: Kostenloser Testzeitraum
SkillUp EdTech
Kompetenzen, die Sie erwerben: Cryptographic Protocols, Blockchain, Business Continuity, Cryptography, Disaster Recovery, Data Management, Digital Assets, Security Management, Vulnerability Assessments, Regulatory Compliance, Enterprise Security, Data Security, Application Security, Cybersecurity, Emerging Technologies, Distributed Computing
- Status: NeuStatus: Kostenloser Testzeitraum
ISC2
Kompetenzen, die Sie erwerben: Cloud Computing Architecture, Cloud Computing, Cloud Infrastructure, Cloud Solutions, Cloud Platforms, Cloud Services, Resource Allocation, Cloud Security, Public Cloud, Infrastructure As A Service (IaaS), Virtualization, Hybrid Cloud Computing, Containerization, Software As A Service, Platform As A Service (PaaS), Application Deployment, Brokerage, Scalability
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Risk Analysis, Risk Management, Cybersecurity, Network Security, Incident Response, Cloud Security, Risk Management Framework, Authentications, Business Continuity Planning, Application Security, Security Management, Threat Modeling, OSI Models, Threat Management, Disaster Recovery, Cryptography, Encryption, Cyber Risk, Identity and Access Management, Vulnerability Assessments
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Incident Response, IT Security Architecture, Identity and Access Management, Continuous Monitoring, Network Security, Security Awareness, Information Systems Security, Security Information and Event Management (SIEM), Application Security, Disaster Recovery, Security Controls, Cloud Security, Cyber Security Strategy, Infrastructure Security, Threat Detection, Cyber Governance, Authentications
- Status: Kostenloser Testzeitraum
Johns Hopkins University
Kompetenzen, die Sie erwerben: Large Language Modeling, Network Security, Cybersecurity, Infrastructure Security, Information Systems Security, Intrusion Detection and Prevention, Threat Modeling, Firewall, Governance, Network Protocols, Data Ethics, Artificial Intelligence
- Status: Kostenloser Testzeitraum
FAIR Institute
Kompetenzen, die Sie erwerben: Cyber Risk, Risk Appetite, Cyber Governance, Risk Management, Regulatory Compliance, Risk Analysis, Cyber Security Strategy, Cybersecurity, Governance Risk Management and Compliance, Insurance, Compliance Management, Business Communication, Technical Communication, Strategic Communication, Business Reporting
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Remote Access Systems, Security Management, Data Security, Cybersecurity, Security Controls, Vulnerability Management, Computer Security Awareness Training, Security Strategy, Incident Response, Continuous Monitoring, Human Factors (Security), General Data Protection Regulation (GDPR), Information Privacy, System Implementation
Kompetenzen, die Sie erwerben: Penetration Testing, Network Security, Cybersecurity, Threat Detection, General Networking, Vulnerability Management, Linux, System Configuration, Command-Line Interface, Software Installation, Virtual Machines, Network Analysis
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Risk Management Framework, Threat Management, Software Development Life Cycle, Cyber Threat Intelligence, Application Security, Cyber Security Policies, Security Management, Security Controls, Security Strategy
O.P. Jindal Global University
Kompetenzen, die Sie erwerben: Digital Transformation, Economics, Policy, and Social Studies, Market Dynamics, E-Commerce, Economics, FinTech, Policty Analysis, Research, and Development, Technology Strategies, Policy Analysis, Innovation, Governance, Emerging Technologies, Cybersecurity, Information Privacy, Critical Thinking
Zusammenfassend finden Sie hier 10 unsere beliebtesten cybersecurity Kurse
- Software Security Testing: Packt
- Designing Robust Information System Security Architectures: LearnQuest
- Business Implementation and Security: SkillUp EdTech
- Cloud Basics: ISC2
- Systems Security Certified Practitioner: Packt
- Managing Information System Security Architecture: LearnQuest
- Artificial Intelligence Industrial Control Systems Security: Johns Hopkins University
- Executive Communication and Governance: FAIR Institute
- Advanced Techniques for Implementing Security Services: LearnQuest
- Learn Man in the Middle Attacks from Scratch: Packt