Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber+attacks"
Skills you'll gain: Vulnerability Management, Azure Active Directory, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Generative AI, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Single Sign-On (SSO), Microsoft Azure, Security Management, Cyber Security Policies, Identity and Access Management, Data Management, Records Management, Authentications, System Monitoring, Data Ethics, ChatGPT
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Infrastructure Security, Firewall, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, System Configuration
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Data Integrity
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Threat Management, Security Controls, Threat Detection, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Cyber Security Assessment, Data Security, Network Security, Enterprise Security, Information Assurance, Incident Response, Data Integrity
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Human Factors (Security), Threat Management, Security Awareness, Cybersecurity, Cyber Risk, Cyber Attacks, Security Strategy, Compliance Training, Employee Training
Kennesaw State University
Skills you'll gain: Incident Response, Contingency Planning, Disaster Recovery, Computer Security Incident Management, Security Management, Crisis Management, Cybersecurity, Business Continuity, Cyber Attacks, Risk Analysis, Business Risk Management, Data Storage
Skills you'll gain: Cybersecurity, Business Continuity, Threat Detection, Endpoint Security, Disaster Recovery, Cyber Security Policies, Vulnerability Assessments, Network Security, Governance Risk Management and Compliance, Continuous Monitoring, Cloud Security, Risk Management
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Malware Protection, Vulnerability Assessments, Operating Systems, OS Process Management
- Status: Free
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Endpoint Detection and Response, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Hunting, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Security Management, Anomaly Detection, Cybersecurity, Security Controls, Interactive Data Visualization, Artificial Intelligence and Machine Learning (AI/ML)
In summary, here are 10 of our most popular cyber+attacks courses
- Microsoft Azure Cybersecurity Tools and Solutions: Microsoft
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- Palo Alto Networks Cybersecurity Foundation: Palo Alto Networks
- Cyber Incident Response: Infosec
- Introduction to Cyber Attacks: New York University
- Cybersecurity Best Practices: Coursera Instructor Network
- Introduction to Cyber Security: New York University
- Cybersecurity and the X-Factor: Kennesaw State University
- Managing Cybersecurity Incidents and Disasters: Kennesaw State University
- Office of the CISO Institute: Cybersecurity Essentials: Google