Filtrer par
ObjetObligatoire
LangueObligatoire
La langue utilisée tout au long du cours, tant dans l’enseignement que dans les évaluations.
Produit d'apprentissageObligatoire
NiveauObligatoire
DuréeObligatoire
Sous-titresObligatoire
ÉducateurObligatoire
Explorez le catalogue de cours de cybersécurité
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Penetration Testing, Network Security, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Security Testing, Security Engineering, Cyber Threat Intelligence, Web Applications, USB, Software Installation, Command-Line Interface, System Configuration
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Threat Detection, Penetration Testing, Linux, Cyber Threat Intelligence, Threat Management, Vulnerability Assessments, Cyber Security Assessment, Network Security, Network Monitoring, Bash (Scripting Language), Scripting, Network Troubleshooting, Incident Response, Anomaly Detection, Cybersecurity, Vulnerability Scanning, Network Analysis, Cyber Security Policies, Data Ethics, Information Systems Security
- Statut : Nouveau
Packt
Compétences que vous acquerrez: Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Active Directory, Web Applications, Microsoft Windows, Cybersecurity, Command-Line Interface, Shell Script, Apache Tomcat, Scripting, Microsoft SQL Servers
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Penetration Testing, OSI Models, Open Web Application Security Project (OWASP), TCP/IP, Network Security, General Networking, Cybersecurity, Large Language Modeling, Prompt Engineering, Vulnerability Assessments, Web Applications, Scripting, Generative AI, Python Programming, SQL, MySQL
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Penetration Testing, Network Security, Wireless Networks, Cybersecurity, Linux, Vulnerability Assessments, Intrusion Detection and Prevention, Command-Line Interface, Linux Commands, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Security Software, Software Installation, File Management, Virtual Machines
- Statut : Nouveau
Banco Interamericano de Desarrollo
Compétences que vous acquerrez: Digital Transformation, Talent Management, Program Evaluation, Data Strategy, Cybersecurity, Technology Strategies, Governance, Project Design, Data Management, Public Administration, Process Improvement
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cybersecurity, Network Security, Network Protocols, Network Analysis, Vulnerability Assessments, Scripting, Remote Access Systems, Python Programming, Command-Line Interface
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Risk Management, Security Management, Continuous Monitoring, Information Assurance, Cyber Governance, Governance, Cybersecurity, Security Controls, Risk Mitigation, Business Risk Management, ISO/IEC 27001, Risk Analysis, Threat Management, Asset Protection, Vulnerability Assessments, Regulatory Compliance, Intellectual Property
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Penetration Testing, OSI Models, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Malware Protection, Cyber Attacks, Wireless Networks, Application Security, Network Monitoring, Linux, Object Oriented Programming (OOP), Vulnerability Assessments, General Networking, Security Awareness, Intrusion Detection and Prevention, Command-Line Interface, Large Language Modeling, Prompt Engineering
- Statut : Nouveau
Macquarie University
Compétences que vous acquerrez: Mobile Security, File Systems, Data Security, Cybersecurity, Data Ethics, Data Integrity, Data Storage Technologies, Data Validation, File Management, Encryption, Verification And Validation, Internet Of Things, Mac OS, Microsoft Windows, Network Monitoring
- Statut : Essai gratuit
Vanderbilt University
Compétences que vous acquerrez: Crisis Management, Incident Response, ChatGPT, Generative AI, Cross-Functional Collaboration, Prompt Engineering, Threat Modeling, Cyber Security Strategy, Cybersecurity, Scenario Testing, Complex Problem Solving
- Statut : Nouveau
Macquarie University
Compétences que vous acquerrez: Information Privacy, Personally Identifiable Information, Data Security, Cybersecurity, Threat Modeling, General Data Protection Regulation (GDPR), Data Integrity, Data Governance, Data Ethics, Vulnerability Assessments, Encryption, Data Sharing, Data Encryption Standard, Risk Modeling, Statistical Methods
En résumé, voici 10 de nos cours les plus populaires sur cybersecurity .
- Exploitation and Penetration Testing with Metasploit: IBM
- IBM Ethical Hacking with Open Source Tools: IBM
- Hands-on Hacking: Packt
- Advanced Web Exploits, Python Scripting & Network Attacks: Packt
- Ethical Hacking Foundations & Network Security: Packt
- Design de projetos de governo digital: Banco Interamericano de Desarrollo
- Exploit Development, Malware, & Defensive Strategies: Packt
- CISSP Domain 1: Security and Risk Management: Infosec
- The Complete Ethical Hacking Course: Packt
- Digital Forensics: Macquarie University