Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability assessment"
University of Michigan
Skills you'll gain: Product Lifecycle Management, Product Development, Product Design, Environment and Resource Management, Environment, Corporate Sustainability, Simulation and Simulation Software, Analysis, Research Reports, Data Analysis Software, Data Collection
Kennesaw State University
Skills you'll gain: Network Security, Incident Response, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Computer Security Incident Management, Cyber Security Policies, Security Management, Firewall, Network Monitoring, Cyber Security Strategy, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Cyber Risk, Network Protocols, Risk Management
- Status: Free
Commonwealth Education Trust
Skills you'll gain: Constructive Feedback, Teaching, Student Engagement, Quality Assessment, Educational Materials, Instructional Strategies, Peer Review, Test Tools, Curriculum Development, Statistical Reporting, Performance Reporting, Reliability
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Business Analytics, Spreadsheet Software, Data Sharing, Data Cleansing, Data Processing, Data Visualization Software, Ethical Standards And Conduct, SQL
Skills you'll gain: Active Listening, Problem Solving, Collaboration, Presentations, Interpersonal Communications, Teamwork, Conflict Management, Creative Problem-Solving, Constructive Feedback, Creative Thinking, Root Cause Analysis, Team Building, Virtual Teams, Team Oriented, Public Speaking, Agile Methodology, Persuasive Communication, Client Services, Ability To Meet Deadlines, Business Research
Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Security Controls, Vulnerability Assessments, Incident Response, Intrusion Detection and Prevention, Malware Protection, Network Architecture
Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Information Systems Security Assessment Framework (ISSAF), Security Strategy, Security Awareness, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis, Personally Identifiable Information
Skills you'll gain: Stakeholder Communications, Incident Response, Stakeholder Engagement, Computer Security Incident Management, Data Ethics, Cybersecurity, Security Awareness, Incident Management, Data Security, Communication, Asset Protection, Ethical Standards And Conduct, Business Ethics, Interviewing Skills, Professional Networking
Skills you'll gain: Data-Driven Decision-Making, Health Assessment, Analysis, Health Care, Statistical Modeling, Clinical Research, Data Modeling, Health Care Administration, Medical Terminology, Risk Analysis
Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, General Networking, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)
- Status: Free
Knowledge Accelerators
Skills you'll gain: Power BI, Dashboard, Data Presentation, Data Visualization Software, Interactive Data Visualization, Data Import/Export, Business Intelligence, Microsoft Excel, Data Analysis, Data-Driven Decision-Making, Data Modeling
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
In summary, here are 10 of our most popular vulnerability assessment courses
- Life Cycle Assessment:Â University of Michigan
- Managing Cybersecurity:Â Kennesaw State University
- Foundations of Teaching for Learning: Introduction to Student Assessment:Â Commonwealth Education Trust
- Foundations: Data, Data, Everywhere:Â Google
- People and Soft Skills for Professional and Personal Success:Â IBM
- Cybersecurity Assessment: CompTIA Security+ & CYSA+:Â IBM
- Foundations of Cybersecurity:Â Google
- Put It to Work: Prepare for Cybersecurity Jobs:Â Google
- Data Science in Health Technology Assessment:Â Genentech
- Connect and Protect: Networks and Network Security:Â Google