Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security assessment"
- Status: Free Trial
Skills you'll gain: Threat Modeling, Role-Based Access Control (RBAC), Azure Active Directory, Active Directory, Microsoft Azure, Data Security, System Monitoring, Cloud Security, Multi-Factor Authentication, Security Management, Continuous Monitoring, Kubernetes, Vulnerability Assessments, Group Policy, Threat Detection, Identity and Access Management, Security Information and Event Management (SIEM), Event Monitoring, Application Security, Network Security
- Status: Free Trial
Amazon Web Services
Skills you'll gain: Amazon CloudWatch, Amazon Web Services, AWS Identity and Access Management (IAM), Amazon DynamoDB, Amazon S3, Amazon Elastic Compute Cloud, Serverless Computing, Load Balancing, Cloud Computing Architecture, Cloud Solutions, Cloud Storage, Solution Architecture, Hybrid Cloud Computing, Scalability, User Accounts, Data Migration, Cloud Security, Cloud Infrastructure, Cloud Management, Cloud Computing
- Status: Preview
University of Pennsylvania
Skills you'll gain: Vital Signs, Blood Pressure, Respiration, Pulmonology, Health Assessment, Cardiology, Neurology, Patient Evaluation, Anatomy
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Cyber Security Policies, Public Safety and National Security, Cyber Risk, Infrastructure Security, Cyber Attacks, Cyber Threat Intelligence, Risk Management Framework, Threat Modeling, Cyber Security Assessment, Cyber Governance, Security Management, Continuous Monitoring, Vulnerability Assessments, Incident Response, Security Strategy, Mobile Security, Threat Management, Legal Risk
- Status: Free Trial
Skills you'll gain: Cybersecurity, Incident Response, Malware Protection, Identity and Access Management, Cyber Attacks, Cyber Threat Intelligence, Network Security, Multi-Factor Authentication, Computer Security Incident Management, Security Controls, Security Awareness, Threat Management, Authentications, Threat Detection, Authorization (Computing), Distributed Denial-Of-Service (DDoS) Attacks, Human Factors (Security)
- Status: Preview
Kennesaw State University
Skills you'll gain: Cybersecurity, Disaster Recovery, Cyber Attacks, IT Security Architecture, Network Security, Application Security, Information Systems Security, Computer Security, Cryptography, Cyber Security Policies, Secure Coding, Encryption, Software Development, Identity and Access Management, OSI Models, Risk Management Framework
- Status: Free
Infosec
Skills you'll gain: Cybersecurity, Cyber Attacks, Cryptography, Identity and Access Management, Data Governance, Encryption, Network Security, Application Security, Data Security, Virtualization, Computer Security, Threat Management, Security Controls, Cloud Computing, Authorization (Computing), User Accounts, Authentications, Information Technology Operations, Incident Response, Risk Management
- Status: Free Trial
Skills you'll gain: Active Listening, Presentations, Problem Solving, Critical Thinking and Problem Solving, Constructive Feedback, Collaboration, Interpersonal Communications, Virtual Teams, Root Cause Analysis, Creative Problem-Solving, Microsoft PowerPoint, Conflict Management, Collaborative Software, Target Audience, Professional Development, Client Services, Personal Development, Social Skills, Expectation Management, Adaptability
- Status: Preview
Georgia Institute of Technology
Skills you'll gain: User Experience Design, Usability, User Centered Design, Interaction Design, Prototyping, Human Centered Design, Design, User Interface (UI) Design, Usability Testing, Requirements Analysis, User Research
- Status: Free Trial
University of Alberta
Skills you'll gain: Requirements Analysis, Agile Methodology, Kanban Principles, Agile Software Development, Requirements Elicitation, Sprint Retrospectives, Requirements Management, Functional Requirement, Project Planning, Business Requirements, Software Development Methodologies, Sprint Planning, Software Development Life Cycle, Scrum (Software Development), Software Technical Review, Backlogs, User Requirements Documents, Product Requirements, Product Management, Project Management
- Status: Preview
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Public Key Cryptography Standards (PKCS), Advanced Encryption Standard (AES), Key Management, Cybersecurity, Authentications, Data Integrity, Algorithms
- Status: Free Trial
Google Cloud
Skills you'll gain: Dataflow, Google Cloud Platform, Data Pipelines, Data Visualization, Serverless Computing, Apache Kafka, Big Data, Cloud Security, Data Processing, MLOps (Machine Learning Operations), Data Infrastructure, AI Personalization, API Gateway, Real Time Data, System Monitoring, Tensorflow, Cloud Infrastructure, Cloud Computing, Identity and Access Management, Debugging
In summary, here are 10 of our most popular cyber security assessment courses
- Microsoft Azure Security Engineer Associate (AZ-500):Â Microsoft
- AWS Fundamentals:Â Amazon Web Services
- Vital Signs: Understanding What the Body Is Telling Us:Â University of Pennsylvania
- Homeland Security and Cybersecurity:Â University of Colorado System
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Cybersecurity and Its Ten Domains:Â Kennesaw State University
- CompTIA Security+ 701:Â Infosec
- People and Soft Skills for Professional and Personal Success:Â IBM
- Introduction to User Experience Design :Â Georgia Institute of Technology
- Software Product Management:Â University of Alberta