Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability analysis"
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, Cyber Risk, Cyber Governance
Tableau Learning Partner
Skills you'll gain: Requirements Elicitation, Business Analysis, Business Metrics, Key Performance Indicators (KPIs), Requirements Analysis, Business Requirements, Process Analysis, Stakeholder Management, Business Process, Business Process Modeling, Tableau Software, Data Visualization
- Status: AI skills
Microsoft
Skills you'll gain: Microsoft Power Platform, Excel Formulas, Process Flow Diagrams, Business Process Modeling, User Story, Business Requirements, Stakeholder Management, Data Modeling, Microsoft Excel, Microsoft Visio, Software Development Life Cycle, Requirements Analysis, Requirements Elicitation, Quality Management, Pivot Tables And Charts, Power BI, Project Management Life Cycle, Microsoft Power Automate/Flow, Business Analysis, Project Management
Rice University
Skills you'll gain: Statistical Hypothesis Testing, Microsoft Excel, Pivot Tables And Charts, Regression Analysis, Descriptive Statistics, Probability & Statistics, Graphing, Spreadsheet Software, Probability Distribution, Business Analytics, Statistical Analysis, Statistical Modeling, Excel Formulas, Data Analysis, Data Presentation, Statistics, Sample Size Determination, Box Plots, Statistical Inference, Estimation
- Status: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
Johns Hopkins University
Skills you'll gain: Clinical Trials, Clinical Research, Qualitative Research, Data Synthesis, Research Methodologies, Data Collection, Research Design, Analysis, Quantitative Research, Risk Analysis, Statistical Methods, Statistical Analysis, Data Analysis
- Status: Free
Stanford University
Skills you'll gain: Descriptive Statistics, Statistics, Statistical Methods, Sampling (Statistics), Statistical Analysis, Data Analysis, Statistical Hypothesis Testing, Regression Analysis, Statistical Inference, Probability, Exploratory Data Analysis, Quantitative Research, Probability Distribution, Correlation Analysis
University of Pennsylvania
Skills you'll gain: Operations Management, Return On Investment, Operational Efficiency, Financial Statements, Financial Statement Analysis, Finance, Human Capital, Go To Market Strategy, Process Analysis, Branding, People Management, Financial Reporting, Capital Budgeting, Financial Accounting, Operational Performance Management, Consumer Behaviour, Leadership and Management, Marketing Planning, Peer Review, Analysis
University of California, Davis
Skills you'll gain: Data Governance, Presentations, Data Cleansing, Feature Engineering, SQL, Apache Spark, A/B Testing, Distributed Computing, Descriptive Statistics, Data Lakes, Data Quality, Data Storytelling, Peer Review, Exploratory Data Analysis, Data Pipelines, Databricks, JSON, Statistical Analysis, Query Languages, Data Manipulation
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
- Status: New
Skills you'll gain: Generative AI, Data Wrangling, Unit Testing, Supervised Learning, Feature Engineering, Keras (Neural Network Library), Deep Learning, ChatGPT, Natural Language Processing, Data Cleansing, Jupyter, Data Analysis, Unsupervised Learning, Data Manipulation, PyTorch (Machine Learning Library), Artificial Intelligence, Data Import/Export, Exploratory Data Analysis, OpenAI, Scikit Learn (Machine Learning Library)
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
In summary, here are 10 of our most popular vulnerability analysis courses
- IT Fundamentals for Cybersecurity: IBM
- Business Analysis Process: Tableau Learning Partner
- Microsoft Business Analyst: Microsoft
- Business Statistics and Analysis: Rice University
- Microsoft Cybersecurity Analyst: Microsoft
- Introduction to Systematic Review and Meta-Analysis: Johns Hopkins University
- Introduction to Statistics: Stanford University
- Business Foundations: University of Pennsylvania
- Learn SQL Basics for Data Science: University of California, Davis
- Assets, Threats, and Vulnerabilities: Google