Filtrer par
La langue utilisée tout au long du cours, tant dans l’enseignement que dans les évaluations.
Explorez le catalogue de cours de cybersécurité
Johns Hopkins University
Compétences que vous acquerrez: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Detection, Threat Modeling, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security
Compétences que vous acquerrez: Personally Identifiable Information, Information Privacy, Security Awareness, Data Security, Cybersecurity, Health Information Management and Medical Records, Information Assurance, Security Controls, Data Sharing, Security Strategy, Health Care, Data Integrity, Data Access, Identity and Access Management, Regulatory Compliance
Compétences que vous acquerrez: Penetration Testing, Network Security, Intrusion Detection and Prevention, Wireless Networks, Cybersecurity, Vulnerability Assessments, Computer Networking, Linux, Encryption, Network Analysis, Command-Line Interface, Virtual Machines
Compétences que vous acquerrez: Penetration Testing, Cyber Security Assessment, Vulnerability Assessments, Infrastructure Security, Distributed Denial-Of-Service (DDoS) Attacks, Application Security, Cloud Security, Network Security, Internet Of Things, Wireless Networks, Application Programming Interface (API), Business Logic
- Statut : Gratuit
Check Point Software Technologies Ltd.
Compétences que vous acquerrez: Threat Management, Threat Detection, Security Controls, Intrusion Detection and Prevention, Identity and Access Management, Firewall, Security Management, Network Administration, Cybersecurity, Network Security, System Configuration, Technical Support and Services, Software Installation, System Implementation, Operating Systems
- Statut : Gratuit
University of Colorado Boulder
Compétences que vous acquerrez: Internet Of Things, General Networking, Network Protocols, Computer Networking, Wireless Networks, Cybersecurity, Infrastructure Security, Emerging Technologies, Software-Defined Networking, Cloud Platforms, Encryption, Embedded Systems
Compétences que vous acquerrez: Endpoint Security, Vulnerability Management, Infrastructure as Code (IaC), Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Vulnerability Scanning, Network Architecture, Cloud Computing, Threat Management, Zero Trust Network Access, Cybersecurity, Cyber Attacks, Network Security, Cyber Security Assessment, IT Security Architecture, Threat Detection, Mobile Security, Hardening
Compétences que vous acquerrez: Incident Response, Computer Security Incident Management, Cyber Attacks, Security Management, Cybersecurity, Risk Management, Cyber Security Assessment, Incident Management, Risk Analysis, Cyber Governance, Threat Management, Secure Coding, Malware Protection, Cyber Risk, Governance, Security Strategy, Enterprise Risk Management (ERM), Intrusion Detection and Prevention, Cyber Threat Intelligence, Governance Risk Management and Compliance
Compétences que vous acquerrez: Penetration Testing, Security Testing, Open Web Application Security Project (OWASP), Application Security, Test Tools, Vulnerability Assessments, Web Development Tools, Cybersecurity, Web Applications, SQL
Compétences que vous acquerrez: Linux Administration, Linux, Linux Servers, Authentications, Virtual Machines, Virtualization, Security Controls, User Accounts, Red Hat Enterprise Linux, System Configuration, Identity and Access Management, Virtual Environment, Cybersecurity
Compétences que vous acquerrez: Security Information and Event Management (SIEM), ChatGPT, Cyber Threat Intelligence, Incident Response, Vulnerability Assessments, Computer Security Incident Management, Threat Modeling, Vulnerability Management, Cloud Security, Threat Detection, Microsoft Azure, Cybersecurity, OpenAI, Azure DevOps, Artificial Intelligence, Code Review
Compétences que vous acquerrez: Incident Response, Email Security, Cloud Security, Computer Security Incident Management, Threat Management, Vulnerability Management, Threat Modeling, Risk Management Framework, Malware Protection, Security Management, Information Systems Security, Network Security, Vulnerability Assessments, Cybersecurity, Incident Management, Threat Detection, Information Assurance, Intrusion Detection and Prevention, Cyber Security Policies, Security Information and Event Management (SIEM)
En résumé, voici 10 de nos cours les plus populaires sur cybersecurity .
- Advanced Network Analysis and Incident Response: Johns Hopkins University
- Privacy and Security for Healthcare Organizations: ISC2
- Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux: Packt
- Advanced Penetration Techniques: Packt
- Check Point Jump Start: Quantum Management: Check Point Software Technologies Ltd.
- 산업용 IoT 시장 및 보안: University of Colorado Boulder
- Cloud Security, Resiliency, and Vulnerability Management: Packt
- Incident Response, Risk Management, and Compliance: Packt
- Web Hacker's Toolbox - Tools Used by Successful Hackers: Packt
- Linux PAM Security Administration: Packt