Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyberwarfare"
EC-Council
Skills you'll gain: Computer Networking, Network Security, Computer Security Incident Management, Security Engineering, Computer Security Models, Cyberattacks, Mobile Security, System Security, Network Architecture, Software Security, Cloud Computing
University of Colorado System
Skills you'll gain: Cryptography, Algorithms, Mathematics, Security Engineering, Mathematical Theory & Analysis, Theoretical Computer Science, Applied Mathematics, Cyberattacks, System Security, Computational Logic, Computational Thinking, Critical Thinking, Leadership and Management
Skills you'll gain: DevOps, Mobile Security, Software Security, System Software, Cyberattacks, Leadership and Management
- Status: Free
EIT Digital
Skills you'll gain: Cyberattacks, Security Engineering, Software Security, System Security, Computer Security Incident Management, Human Factors (Security), Network Security, Security Strategy, Mobile Security, Computer Security Models, Leadership and Management
University of California, Irvine
Skills you'll gain: Leadership and Management
University of Colorado System
Skills you'll gain: Cryptography, Security Engineering, Algorithms, Cyberattacks, Mathematics, System Security
Infosec
Skills you'll gain: Computer Security Incident Management
Skills you'll gain: Python Programming
University of Minnesota
Skills you'll gain: Network Security, Security Engineering, System Security, Computer Networking, Cloud Computing, Cryptography, Software Security, Computer Security Models, Network Architecture, Account Management
- Status: Free
Skills you'll gain: Critical Thinking
- Status: Free
Coursera Instructor Network
Skills you'll gain: Python Programming, Computer Programming
In summary, here are 10 of our most popular cyberwarfare courses
- Ethical Hacking Essentials (EHE):Â EC-Council
- Introduction to Applied Cryptography:Â University of Colorado System
- Incident Response and Digital Forensics:Â IBM
- Cybersecurity Awareness and Innovation:Â EIT Digital
- Security Governance & Compliance:Â University of California, Irvine
- Classical Cryptosystems and Core Concepts:Â University of Colorado System
- Stages of Incident Response:Â Infosec
- Execution, persistence, privilege escalation and evasion:Â Infosec
- Cloud Security Basics:Â University of Minnesota
- Understanding 9/11: Why 9/11 Happened & How Terrorism Affects Our World Today:Â Duke University