Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber operations"
Skills you'll gain: Threat Management, Cybersecurity, Risk Management Framework, Risk Management, Business Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Open Web Application Security Project (OWASP), Auditing
Kennesaw State University
Skills you'll gain: Network Security, Incident Response, Network Administration, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Computer Security Incident Management, Cyber Security Policies, Security Management, Firewall, Network Monitoring, General Networking, Cyber Security Strategy, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Risk Management
University of Illinois Urbana-Champaign
Skills you'll gain: Operations Management, Organizational Strategy, Manufacturing Operations, Operational Analysis, Business Operations, Supply Chain, Inventory Management System, Process Analysis, Decision Making, Strategic Decision-Making, Business Strategy, Process Design, Cost Benefit Analysis, Demand Planning, Capacity Management, Service Level
Intuit
Skills you'll gain: Bookkeeping, QuickBooks (Accounting Software), Financial Statements, Ledgers (Accounting), Accounting, Accounting Records, Balance Sheet, Income Statement, General Ledger, Ethical Standards And Conduct, Cash Flows
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Peripheral Devices, Cybersecurity, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Cloud Platforms, Encryption, Data Storage, Cyber Attacks, Software Development Life Cycle, Technical Support, Networking Hardware, Application Development, Computer Hardware, Information Technology, Cloud Computing, Databases
Skills you'll gain: Cloud Computing Architecture, Technical Support, Technical Support and Services, Cloud Services, Peripheral Devices, Cybersecurity, Computing Platforms, Hardware Troubleshooting, IT Service Management, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Desktop Support, Encryption, Data Storage, Software Development Life Cycle, Professional Networking, Information Technology, Cloud Computing, Interviewing Skills
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption
Skills you'll gain: Debugging, Python Programming, Cybersecurity, Cyber Security Assessment, Scripting, Programming Principles, Algorithms, Automation, Integrated Development Environments, File Management, Data Structures
University of Illinois Urbana-Champaign
Skills you'll gain: Data Storytelling, Revenue Recognition, Financial Statements, Data Presentation, Data Visualization, Accrual Accounting, Cash Flows, Financial Accounting, Data Collection, Bookkeeping, Tidyverse (R Package), Income Statement, Data Processing, Data Visualization Software, Business Valuation, Business Analytics, Balance Sheet, Data Quality, Asset Management, Analytics
Skills you'll gain: CI/CD, Istio, Open Web Application Security Project (OWASP), Continuous Integration, Agile Software Development, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Jenkins, Kubernetes, Code Coverage, OpenShift, Cloud Applications, Containerization, Agile Methodology, Behavior-Driven Development, DevOps, Secure Coding, Grafana, System Monitoring
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
University of Pennsylvania
Skills you'll gain: Business Analytics, Descriptive Analytics, Predictive Analytics, Analytics, Demand Planning, Data-Driven Decision-Making, Operational Analysis, Business Operations, Risk Analysis, Forecasting, Operations Management, Simulation and Simulation Software, Process Optimization, Decision Making, Decision Tree Learning, Spreadsheet Software, Microsoft Excel, Probability Distribution
In summary, here are 10 of our most popular cyber operations courses
- Play It Safe: Manage Security Risks:Â Google
- Managing Cybersecurity:Â Kennesaw State University
- Operations Management: Organization and Analysis:Â University of Illinois Urbana-Champaign
- Bookkeeping Basics:Â Intuit
- Information Technology (IT) and Cloud Fundamentals:Â IBM
- IBM IT Support:Â IBM
- Assets, Threats, and Vulnerabilities:Â Google
- Automate Cybersecurity Tasks with Python:Â Google
- Business Data Management and Communication:Â University of Illinois Urbana-Champaign
- IBM Applied DevOps Engineering:Â IBM