Cybersicherheits-Kurse können Ihnen helfen zu lernen, wie Systeme geschützt, Risiken erkannt und Vorfälle bewertet werden. Sie können Fähigkeiten in Netzwerksicherheit, Identitätsverwaltung, Bedrohungsanalyse und grundlegenden Sicherheitsmethoden aufbauen. Viele Kurse nutzen Tools, Dashboards und Beispiele, um typische Sicherheitsaufgaben zu veranschaulichen.

Kompetenzen, die Sie erwerben: Modellierung von Bedrohungen, Modellierung großer Sprachen, AI-Sicherheit, Prompt-Muster, Verantwortungsvolle AI, Erkennung von Bedrohungen, Generative Modellarchitekturen, Sicherheit für Unternehmen, Sicherheitsbewußtsein, Sicherheitsstrategie, Sicherheitsmanagement, Cyber-Bedrohungsdaten, Cyber-Angriffe, IT-Sicherheitsarchitektur, Cyber-Sicherheitsstrategie, Bewertungen der Anfälligkeit, Verteilte Denial-Of-Service-Angriffe (DDoS), Cloud-Sicherheit, Sicherheit von Informationssystemen, Cybersecurity
Anfänger · Kurs · 1–4 Wochen

AI CERTs
Kompetenzen, die Sie erwerben: Responsible AI, Model Training, Data Ethics, Tensorflow, Telecommunications, PyTorch (Machine Learning Library), Anomaly Detection, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Generative AI, Emerging Technologies, Wireless Networks, Generative AI Agents, Digital Communications, Network Performance Management, Network Architecture, Network Protocols, Computer Networking, Communication, System Design and Implementation
Fortgeschritten · Spezialisierung · 1–3 Monate

Kompetenzen, die Sie erwerben: Manufacturing Processes, Computer-Aided Design, Automation, Internet Of Things, Manufacturing and Production, Digital Transformation, Manufacturing Operations, Geometric Dimensioning And Tolerancing, Simulation and Simulation Software, Network Infrastructure, Finite Element Methods, AI Integrations, Cloud Computing
Mittel · Kurs · 1–4 Wochen

Kompetenzen, die Sie erwerben: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation
Fortgeschritten · Kurs · 1–3 Monate

Kompetenzen, die Sie erwerben: Penetration Testing, Security Testing, Hardening, Test Script Development, Brute-force attacks, Business Logic, Cloud Security, Network Analysis, Programming Principles, API Testing, General Data Protection Regulation (GDPR), Cloud Computing, Wireless Networks, Data Persistence, Application Programming Interface (API), Data Security
Mittel · Spezialisierung · 1–3 Monate

Kompetenzen, die Sie erwerben: Incident Response, Cyber Security Strategy, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Cyber Attacks, Information Systems Security, Metasploit, Security Strategy, Infrastructure Security, Incident Management, Vulnerability Scanning, Security Testing, Hardening, Security Controls, Penetration Testing, Mobile Security
Fortgeschritten · Kurs · 1–3 Monate

Kompetenzen, die Sie erwerben: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Anomaly Detection, Cybersecurity, Data Analysis Software, Artificial Intelligence and Machine Learning (AI/ML)
Anfänger · Kurs · 1–4 Wochen

Kompetenzen, die Sie erwerben: Cryptographic Protocols, Network Security, Encryption, OSI Models, Cryptography, IT Security Architecture, Network Performance Management, Network Architecture, Computer Networking, General Networking, Communication Systems, Remote Access Systems, TCP/IP, Network Infrastructure, Network Protocols, Wireless Networks, Virtual Private Networks (VPN), Virtual Networking, Endpoint Security, Cloud Security
Mittel · Kurs · 1–4 Wochen

Kompetenzen, die Sie erwerben: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Cyber Threat Intelligence, Exploitation techniques, Threat Management, Brute-force attacks, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Authentications, Network Protocols
Mittel · Kurs · 1–3 Monate

Kompetenzen, die Sie erwerben: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Vulnerability Scanning, Cyber Attacks, Network Architecture, Cloud Computing, Threat Management, Cloud Infrastructure, Zero Trust Network Access, Cybersecurity, Cyber Security Strategy, Network Security, Cloud Deployment, Application Security, Infrastructure Security
Mittel · Kurs · 1–3 Monate

Kompetenzen, die Sie erwerben: Vulnerability Assessments, Vulnerability Scanning, Exploitation techniques, Cyber Security Assessment, Unix, Security Testing, Network Security, Cybersecurity, Information Systems Security, Cyber Attacks, Network Analysis, Web Applications, Virtual Machines, Web Servers
Anfänger · Kurs · 1–4 Wochen

Check Point Software Technologies Ltd.
Kompetenzen, die Sie erwerben: Endpoint Security, Endpoint Detection and Response, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Security Policies, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Infrastructure Architecture, Communication Systems, Package and Software Management, Linux, Software Versioning
Anfänger · Kurs · 1–3 Monate