Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat+(computer)"
- Status: [object Object]
Google
Skills you'll gain: Network Security, Python Programming, Linux, Cloud Computing, Audit, Computer Programming, Computer Security Incident Management, Cryptography, Databases, Leadership and Management, Network Architecture, Risk Management, SQL
Skills you'll gain: DevOps, Mobile Security, Software Security, System Software, Cyberattacks, Leadership and Management
- Status: Free
Peking University
Skills you'll gain: Computer Architecture, Hardware Design
Skills you'll gain: Security Strategy, Computer Security Incident Management, Python Programming, Computer Programming, Cryptography
Skills you'll gain: Cryptography, Leadership and Management, Linux
Skills you'll gain: Audit, Computer Security Incident Management, Leadership and Management, Risk Management
Skills you'll gain: Network Security, Networking Hardware, Databases, SQL
University of Maryland, College Park
Skills you'll gain: Human Computer Interaction, Software Security, System Security, Systems Design, User Experience, Cyberattacks, Design and Product, Security Engineering, User Research, Interactive Design
Skills you'll gain: Artificial Neural Networks
Skills you'll gain: Security Engineering, Application Development, Software Engineering, Software Security, DevOps
University of Colorado System
Skills you'll gain: System Security, Operating Systems, Network Security, Security Software, Security Strategy, Computer Security Incident Management, Security Engineering, System Software, Computer Networking, Computer Security Models, Leadership and Management, Audit, Software Security, Data Management, Network Architecture, Planning, Account Management, Computer Architecture, Strategy, System Programming
Infosec
In summary, here are 10 of our most popular threat+(computer) courses
- Google Cybersecurity: Google
- Incident Response and Digital Forensics: IBM
- 计算机组成 Computer Organization: Peking University
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Assets, Threats, and Vulnerabilities: Google
- Play It Safe: Manage Security Risks: Google
- Computer Networks and Network Security: IBM
- Usable Security: University of Maryland, College Park
- IBM Generative AI for Cybersecurity Professionals: IBM
- Application Security for Developers and DevOps Professionals: IBM