Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security"
Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Data Lakes, Amazon DynamoDB, Amazon Web Services, Serverless Computing, Cloud Computing, Amazon S3, Scalability, Amazon Elastic Compute Cloud, Event-Driven Programming, Cloud Security, Solution Architecture, Data Visualization, Cloud Computing Architecture, Cloud Storage, Data Architecture, API Gateway, Data Infrastructure, AWS CloudFormation
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP)
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption
- Status: New
Vanderbilt University
Skills you'll gain: Prompt Engineering, ChatGPT, Generative AI, Crisis Management, Productivity, Incident Response, AI Personalization, OpenAI, Artificial Intelligence, Personalized Service, Large Language Modeling, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Expense Management, Threat Modeling, Creative Thinking, Cyber Security Strategy
Kennesaw State University
Skills you'll gain: Internet Of Things, Cybersecurity, Cyber Security Policies, Mobile Security, Security Awareness, Wireless Networks, Information Privacy, Data Security, Emerging Technologies, Enterprise Security, Risk Management Framework
Skills you'll gain: Software Development Life Cycle, Computing Platforms, Cloud Computing Architecture, Cloud Services, Peripheral Devices, Cybersecurity, Cloud Security, Cloud Applications, Cloud Platforms, Network Protocols, Cyber Attacks, Technical Support, Database Management, Security Awareness, Cloud Storage, Computer Hardware, General Networking, Information Technology, Cloud Computing, Databases
Skills you'll gain: Network Security, Information Systems Security, Cybersecurity, Application Security, Encryption, Security Controls, Cyber Attacks, Security Awareness, Data Security, Cryptography, Threat Modeling, Security Management, Computer Security Awareness Training, Information Assurance, Wireless Networks, Hardening, Firewall, Malware Protection, Authentications, Authorization (Computing)
Skills you'll gain: Software Development Life Cycle, Computing Platforms, Cloud Computing Architecture, Technical Support, Technical Support and Services, Cloud Services, Peripheral Devices, Cybersecurity, Hardware Troubleshooting, IT Service Management, Cloud Security, Cloud Applications, Desktop Support, Network Protocols, Cyber Attacks, Professional Networking, Cloud Storage, Information Technology, Cloud Computing, Interviewing Skills
- Status: New
Skills you'll gain: Data Warehousing, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, SQL, Database Administration, MySQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Transformation, Data Store, IBM DB2, Jupyter, Generative AI
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Governance, Data Security, Data Migration, Database Design, Data Literacy, Descriptive Statistics, Extract, Transform, Load, Data Mining, Cloud Storage, Data Visualization Software, Data Store, IBM DB2, Data Management, Relational Databases, MySQL, Excel Formulas
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Encryption, Bash (Scripting Language), Security Strategy
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Application Specific Integrated Circuits, Cryptography, Encryption, Emerging Technologies, Authentications, System Design and Implementation, Computational Logic
In summary, here are 10 of our most popular cyber security courses
- AWS Cloud Solutions Architect:Â Amazon Web Services
- Security Analyst Fundamentals:Â IBM
- Assets, Threats, and Vulnerabilities:Â Google
- Generative AI Cybersecurity & Privacy for Leaders:Â Vanderbilt University
- Cybersecurity and the Internet of Things:Â Kennesaw State University
- Information Technology (IT) and Cloud Fundamentals:Â IBM
- IT Security: Defense against the digital dark arts :Â Google
- IBM IT Support:Â IBM
- IBM Relational Database Administrator:Â IBM
- IBM Data Management:Â IBM