Filtern nach
BetreffErforderlich
SpracheErforderlich
Die im gesamten Kurs, sowohl für Anweisungen als auch Bewertungen, verwendete Sprache.
LernproduktErforderlich
NiveauErforderlich
DauerErforderlich
UntertitelErforderlich
LehrkraftErforderlich
Erkunden Sie den Cybersicherheits-Kurskatalog
Kompetenzen, die Sie erwerben: Public Key Infrastructure, Cryptography, Key Management, Encryption, Infrastructure Security, Cyber Security Policies, Windows Servers, Identity and Access Management, Data Integrity
- Status: Vorschau
Coursera Instructor Network
Kompetenzen, die Sie erwerben: Large Language Modeling, Prompt Engineering, Threat Modeling, Security Testing, Vulnerability Assessments, Vulnerability Management, Application Security, Cybersecurity, Data Security, Natural Language Processing
- Status: Kostenlos
Coursera Project Network
Kompetenzen, die Sie erwerben: Network Troubleshooting, Network Security, Network Protocols, Network Monitoring, TCP/IP, Network Analysis, Web Servers
- Status: Kostenloser Testzeitraum
Board Infinity
Kompetenzen, die Sie erwerben: Cloud Computing, Augmented and Virtual Reality (AR/VR), Emerging Technologies, Hybrid Cloud Computing, Augmented Reality, Blockchain, Cybersecurity, Multi-Cloud, Artificial Intelligence and Machine Learning (AI/ML), Virtual Reality, Artificial Intelligence, Big Data, Cloud Security, Machine Learning
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Secure Coding, Security Testing, Application Security, Payment Systems, Patch Management, Security Engineering, Blockchain, Threat Modeling, Continuous Monitoring, Vulnerability Scanning, System Monitoring, Penetration Testing, Incident Response, Code Review, Authorization (Computing), Cryptographic Protocols, Software Design Patterns
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Blockchain, Transaction Processing, User Interface (UI), Payment Processing, User Interface (UI) Design, Web Development Tools, Front-End Web Development, Application Development, Web Applications, HTML and CSS, JavaScript Frameworks, Data Management, User Accounts, Javascript, Scalability
Kompetenzen, die Sie erwerben: Vulnerability Scanning, Penetration Testing, Vulnerability Assessments, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Remote Access Systems, Virtual Machines, Microsoft Windows, Technical Documentation, Virtual Environment, Network Monitoring, System Configuration, Unix, Command-Line Interface, Software Installation, Linux Commands, Scripting
- Status: Kostenlos
Check Point Software Technologies Ltd.
Kompetenzen, die Sie erwerben: Endpoint Security, Malware Protection, Threat Management, Cybersecurity, Application Deployment, Threat Detection, Security Controls, Computer Security Incident Management, Security Management, Security Strategy, Network Protocols, Enterprise Architecture
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Blockchain, Application Security, Security Engineering, Data Security, Cryptography, Network Security, Information Systems Security, Computer Security, Cybersecurity, Systems Architecture, Vulnerability Assessments, Cryptographic Protocols, Software Architecture, Threat Modeling, Encryption, Key Management, Distributed Denial-Of-Service (DDoS) Attacks, Public Key Cryptography Standards (PKCS), Data Integrity, Risk Management
- Status: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Threat Modeling, Risk Analysis, Vulnerability Assessments, Vulnerability Management, Business Risk Management, Risk Management, Business Continuity, Risk Mitigation, Risk Modeling, Threat Detection, Penetration Testing, Cyber Security Assessment, Disaster Recovery
- Status: Kostenlos
Google Cloud
Kompetenzen, die Sie erwerben: Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Intelligence, Cloud Security, Computer Security Incident Management, Google Cloud Platform, Network Security, System Monitoring, Cloud Computing
- Status: NeuStatus: Vorschau
Macquarie University
Kompetenzen, die Sie erwerben: Intrusion Detection and Prevention, Anomaly Detection, Threat Detection, Cyber Security Strategy, Cyber Threat Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Cybersecurity, Threat Modeling, Applied Machine Learning, Malware Protection, MLOps (Machine Learning Operations), Network Security, Machine Learning Methods, Machine Learning, Artificial Intelligence, Network Analysis, Machine Learning Algorithms, Data-Driven Decision-Making
Zusammenfassend finden Sie hier 10 unsere beliebtesten cybersecurity Kurse
- Cryptography: Learn Public Key Infrastructure from Scratch: Packt
- Introduction to Prompt Injection Vulnerabilities: Coursera Instructor Network
- Wireshark for Packet Capture: Analyze web traffic: Coursera Project Network
- Key Industry 4.0 Technologies in Manufacturing - 2: Board Infinity
- Security and Auditing in Ethereum: EDUCBA
- Decentralized Application (DApp) Development: EDUCBA
- Pentesting Fundamentals for Beginners: Packt
- Check Point Jump Start: Harmony Endpoint Security: Check Point Software Technologies Ltd.
- Blockchain Security - Foundational Concepts: LearnQuest
- IT Risk Assessment Practices: Packt