Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability assessments"
- Status: Free TrialStatus: New AI skills
Google
Skills you'll gain: Threat Modeling, Network Security, Threat Management, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Attacks, Cybersecurity, Network Protocols, Professional Networking, Bash (Scripting Language), Operating Systems, Security Controls, Stakeholder Communications, Debugging, Interviewing Skills, Python Programming
- Status: Free TrialStatus: AI skills
Microsoft
Skills you'll gain: Data Storytelling, Dashboard, Excel Formulas, Extract, Transform, Load, Power BI, Data Analysis Expressions (DAX), Microsoft Excel, Microsoft Copilot, Data Modeling, Data-Driven Decision-Making, Star Schema, Data Analysis, Data Presentation, Data Visualization Software, Microsoft Power Platform, Spreadsheet Software, Data Validation, Interactive Data Visualization, Data Transformation, Data Cleansing
- Status: New
Macquarie University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Threat Modeling, Cyber Risk, Cyber Security Assessment, Vulnerability Assessments, Compliance Management, ISO/IEC 27001, Return On Investment, NIST 800-53, Risk Management, Auditing, Stakeholder Engagement
- Status: New
Skills you'll gain: Cyber Threat Intelligence, Incident Response, Vulnerability Assessments, Threat Modeling, Cybersecurity, Network Security, Penetration Testing, Security Controls, Threat Detection, Vulnerability Management, Intrusion Detection and Prevention, Application Security, Malware Protection
- Status: Free TrialStatus: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Threat Management, Vulnerability Scanning, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
- Status: Free Trial
Skills you'll gain: Talent Acquisition, Training and Development, Compensation and Benefits, Training Programs, Recruitment, Employee Training, Full Cycle Recruitment, Job Analysis, Employee Performance Management, Compensation Management, Performance Appraisal, Job Evaluation, Developing Training Materials, Compensation Strategy, Human Resource Policies, Organizational Structure, Occupational Safety And Health, Business Continuity Planning, Risk Management, Business Risk Management
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Cyber Security Strategy, Security Awareness, Security Management
- Status: Free Trial
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption
- Status: Free Trial
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Open Web Application Security Project (OWASP), Cyber Operations, Vulnerability Assessments, Security Information and Event Management (SIEM), Test Planning, Network Analysis, Data Integrity
- Status: Free Trial
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
- Status: Free Trial
Skills you'll gain: Prompt Engineering, Generative AI, ChatGPT, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Large Language Modeling, Artificial Intelligence, Natural Language Processing, Program Development, Anomaly Detection, Vulnerability Management, Content Creation, Image Analysis, Virtual Environment
- Status: Free TrialStatus: AI skills
Microsoft
Skills you'll gain: Microsoft Power Platform, Excel Formulas, Process Flow Diagrams, Business Process Modeling, User Story, Business Requirements, Stakeholder Management, Data Modeling, Microsoft Excel, Microsoft Visio, Software Development Life Cycle, Requirements Analysis, Requirements Elicitation, Quality Management, Pivot Tables And Charts, Power BI, Microsoft Power Automate/Flow, Scrum (Software Development), Business Analysis, Project Management
In summary, here are 10 of our most popular vulnerability assessments courses
- Google Cybersecurity:Â Google
- Microsoft Power BI Data Analyst:Â Microsoft
- Cyber Strategy, Planning & Compliance:Â Macquarie University
- TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003):Â Packt
- Microsoft Cybersecurity Analyst:Â Microsoft
- HRCI Human Resource Associate:Â HRCI
- Cybersecurity Risk Management Frameworks:Â Kennesaw State University
- Assets, Threats, and Vulnerabilities:Â Google
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Application Security for Developers and DevOps Professionals:Â IBM