Filter by
The language used throughout the course, in both instruction and assessments.
Results for "attack+and+defend"
University of Colorado System
Skills you'll gain: Security Engineering, Network Security, System Security, Computer Security Incident Management, Cyberattacks, Software Security, Security Software, Computer Security Models, Computer Networking, Leadership and Management, Security Strategy, Risk Management, Software Testing, Cloud Computing, Operating Systems
Palo Alto Networks
Skills you'll gain: Computer Networking, Cyberattacks, Network Security, Security Engineering, Security Strategy, Software Security, Strategy, System Security, Cloud Computing, Strategy and Operations
New York University
Skills you'll gain: Cyberattacks, Security Engineering
The Hong Kong University of Science and Technology
Skills you'll gain: Sales, Strategy and Operations, Business Development, Entrepreneurship, Leadership and Management, Marketing, Strategy
University of Colorado System
Skills you'll gain: Cyberattacks, Network Security, Security Engineering, Software Security, Computer Networking, Computer Security Incident Management, System Security, Cloud Computing, Computer Security Models, Operating Systems
Fortinet, Inc.
DeepLearning.AI
Skills you'll gain: Artificial Neural Networks, Deep Learning, Machine Learning, Machine Learning Algorithms, Computer Vision, Python Programming, Computer Programming, Human Learning
The Museum of Modern Art
University of Colorado System
Skills you'll gain: Network Security, Security Engineering, System Security, Computer Networking, Computer Security Incident Management, Cyberattacks, Security Software, Software Security, Computer Security Models, Network Analysis
Searches related to attack+and+defend
In summary, here are 10 of our most popular attack+and+defend courses
- Cybersecurity for Business:Â University of Colorado System
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks:Â Google Cloud
- Introduction to Cyber Attacks:Â New York University
- Protecting Business Innovations via Strategy:Â The Hong Kong University of Science and Technology
- Cyber Threats and Attack Vectors:Â University of Colorado System
- FortiGate Administrator:Â Fortinet, Inc.
- Cybersecurity Solutions and Microsoft Defender:Â Microsoft
- Apply Generative Adversarial Networks (GANs):Â DeepLearning.AI
- Art & Activity: Interactive Strategies for Engaging with Art:Â The Museum of Modern Art