Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat+(computer)"
Multiple educators
Skills you'll gain: Unit Testing, Data Structures, Event-Driven Programming, Interactive Data Visualization, Java, Java Programming, Object Oriented Programming (OOP), Development Testing, User Interface (UI), Debugging, Software Testing, Cryptography, Computer Programming, Performance Tuning, Encryption, Algorithms, Graphical Tools, Software Engineering, Program Development, Programming Principles
University of California, Santa Cruz
Skills you'll gain: C++ (Programming Language), Go (Programming Language), Debugging, C (Programming Language), Data Structures, Object Oriented Programming (OOP), Object Oriented Design, Software Design Patterns, Programming Principles, Computer Programming, Unit Testing, Algorithms, Command-Line Interface, Program Development, Software Design, Graph Theory, Computer Science, Software Testing, File Systems, Computational Thinking
Infosec
Skills you'll gain: File Systems, Criminal Investigation and Forensics, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, File Management, Operating Systems, Data Structures, Data Ethics, General Networking, Data Validation, Record Keeping, Data Storage Technologies, Data Integrity, Data Analysis Software, User Accounts, USB, Systems Analysis
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Puppet (Configuration Management Tool), CI/CD, Containerization, Debugging, Bash (Scripting Language), Infrastructure as Code (IaC), Docker (Software), Continuous Deployment, Continuous Integration, Technical Communication, Network Troubleshooting, Linux Commands, Linux, Scripting, Automation, Python Programming, Computer Programming
- Status: Free
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security Awareness Training, Threat Detection, General Networking, Vulnerability
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection, Data Sharing
Skills you'll gain: Jest (JavaScript Testing Framework), Version Control, User Research, Usability Testing, Responsive Web Design, Cascading Style Sheets (CSS), Data Structures, Unix Commands, HTML and CSS, Git (Version Control System), Persona (User Experience), GitHub, Interaction Design, User Experience Design, Bootstrap (Front-End Framework), React.js, Mobile Development, Front-End Web Development, Algorithms, Web Development Tools
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Information Systems Security, Computer Security Awareness Training, Risk Management, Vulnerability Assessments, Enterprise Security, Cyber Security Assessment
University of Michigan
Skills you'll gain: Web Scraping, JSON, Network Protocols, Web Services, Restful API, Application Programming Interface (API), Extensible Markup Language (XML), Data Import/Export, Data Processing, TCP/IP, Python Programming, Scripting, Hypertext Markup Language (HTML), Data Manipulation, Data Structures
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Dashboard, Data Visualization Software, Plotly, Data Wrangling, Data Visualization, Exploratory Data Analysis, Data Cleansing, Jupyter, Matplotlib, Data Analysis, Pandas (Python Package), Data Manipulation, Seaborn, Data Transformation, Data Import/Export, Predictive Modeling, Web Scraping, Interactive Data Visualization, Automation, Python Programming
In summary, here are 10 of our most popular threat+(computer) courses
- Object Oriented Programming in Java: Duke University
- C, Go, and C++: A Comprehensive Introduction to Programming: University of California, Santa Cruz
- Computer Forensics: Infosec
- Google IT Automation with Python: Google
- Cybersecurity for Everyone: University of Maryland, College Park
- Proactive Computer Security: University of Colorado System
- Meta Front-End Developer: Meta
- Connect and Protect: Networks and Network Security: Google
- Cybersecurity for Business: University of Colorado System
- Using Python to Access Web Data: University of Michigan