Filter by
The language used throughout the course, in both instruction and assessments.
Results for "attack+and+defend"
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Information Systems Security, Computer Security Awareness Training, Risk Management, Vulnerability Assessments, Enterprise Security, Cyber Security Assessment
Skills you'll gain: Endpoint Security, Application Security, Cloud Security, Cyber Attacks, Cybersecurity, Malware Protection, Information Systems Security, Security Awareness, Data Security, Cloud Computing, Network Security, Threat Detection, Encryption, Virtualization, Data Ethics
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
The University of Sydney
Skills you'll gain: Linear Algebra, Markov Model, Geometry, Arithmetic, Algebra, General Mathematics, Advanced Mathematics, Probability, Mathematics and Mathematical Modeling, Mathematical Theory & Analysis, Applied Mathematics, Statistical Methods, Engineering Analysis
The Hong Kong University of Science and Technology
Skills you'll gain: E-Commerce, Global Marketing, Brand Management, Business Strategies, Branding, Brand Strategy, Innovation, Strategic Partnership, Price Negotiation, New Business Development, Corporate Strategy, Mergers & Acquisitions, Business Process, Digital Assets, Business Strategy, Business Software, Law, Regulation, and Compliance, Commercialization, New Product Development, Creativity
EC-Council
Skills you'll gain: Network Security, Mobile Security, Public Key Infrastructure, Cryptography, Security Controls, Cybersecurity, Authorization (Computing), Authentications, Identity and Access Management, Wireless Networks, Cloud Computing, Cloud Security, Network Monitoring, Data Security, Internet Of Things, Virtualization and Virtual Machines
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Information Systems Security, Cybersecurity, Computer Security, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Algorithms
Skills you'll gain: Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Security Awareness, Cyber Threat Intelligence, Malware Protection, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security), Personally Identifiable Information
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
DeepLearning.AI
Skills you'll gain: Generative AI, PyTorch (Machine Learning Library), Data Ethics, Deep Learning, Machine Learning, Image Analysis, Computer Graphics, Artificial Intelligence and Machine Learning (AI/ML)
Searches related to attack+and+defend
In summary, here are 10 of our most popular attack+and+defend courses
- Cybersecurity for Business: University of Colorado System
- Systems and Application Security: ISC2
- Cybersecurity Threat Vectors and Mitigation: Microsoft
- Introduction to Linear Algebra: The University of Sydney
- Protecting Business Innovation: The Hong Kong University of Science and Technology
- Network Defense Essentials (NDE): EC-Council
- Detecting and Mitigating Cyber Threats and Attacks: University of Colorado System
- Applied Cryptography: University of Colorado System
- Cybersecurity Attack and Defense Fundamentals: EC-Council
- Cyber Threats and Attack Vectors: University of Colorado System