Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security"
- Status: Free Trial
Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption
- Status: Free Trial
University of Colorado System
Skills you'll gain: Application Security, Vulnerability Assessments, Software Design, Threat Modeling, Vulnerability Management, Security Engineering, Secure Coding, Software Design Patterns, Software Architecture, Software Visualization, Cryptography, Blockchain, Public Key Cryptography Standards (PKCS)
- Status: Free Trial
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
Knowledge Accelerators
Skills you'll gain: General Data Protection Regulation (GDPR), Information Privacy, Personally Identifiable Information, Regulatory Compliance, Compliance Management, Data Security, Governance, Data Governance, Regulatory Requirements, Data Management, Legal Risk, Data Collection
- Status: Free Trial
Skills you'll gain: Microsoft Copilot, Prompt Engineering, Microsoft 365, Microsoft Outlook, Productivity Software, Collaborative Software, ChatGPT, Microsoft Word, Microsoft PowerPoint, Microsoft Excel, Artificial Intelligence, Generative AI, Identity and Access Management, Data Security
- Status: Free Trial
Skills you'll gain: Identity and Access Management, Google Cloud Platform, Cloud Infrastructure, Cloud Computing, Cloud Management, Data Storage, Cloud Storage, Security Controls, System Monitoring, NoSQL, Encryption, Scalability
- Status: Free Trial
Universidad de los Andes
Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Threat Modeling, Cybersecurity, Vulnerability Management, Cyber Security Assessment, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Cyber Risk, Web Servers, Servers, Web Applications
- Status: Free Trial
University of Illinois Urbana-Champaign
Skills you'll gain: Financial Policy, Economics, Financial Market, Financial Data, Banking, International Finance, Financial Regulation, Market Liquidity, Market Dynamics, Crisis Management
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Vulnerability Management, Security Testing, Network Security, Threat Detection, Network Monitoring, Operating Systems, Technical Services
- Status: Free Trial
University of Colorado System
Skills you'll gain: Requirements Elicitation, Requirements Analysis, Mockups, User Story, Interviewing Skills, Storyboarding, Functional Requirement, Business Requirements, Prototyping, User Research, Stakeholder Engagement, Prioritization
- Status: Free Trial
Skills you'll gain: Linux Commands, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Vulnerability Scanning, Command-Line Interface, Scripting, Vulnerability Assessments, Scripting Languages, Cyber Security Assessment, Intrusion Detection and Prevention, General Networking, Application Security, Python Programming, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, System Configuration
Johns Hopkins University
Skills you'll gain: DevOps, DevSecOps, CI/CD, GitHub, Continuous Deployment, Continuous Integration, Continuous Delivery, Version Control, Git (Version Control System), Process Improvement, Web Development Tools, Software Development, Information Technology Infrastructure Library, Cross-Functional Collaboration, Automation
In summary, here are 10 of our most popular cyber security courses
- Database Essentials and Vulnerabilities:Â IBM
- Software Design Threats and Mitigations:Â University of Colorado System
- Cloud Security Risks: Identify and Protect Against Threats:Â Google Cloud
- The ABC's of GDPR: Protecting Privacy in an Online World :Â Knowledge Accelerators
- Introduction to Microsoft 365 Copilot:Â Microsoft
- Essential Cloud Infrastructure: Core Services en Español: Google Cloud
- Vulnerabilidades y pruebas de penetración: Universidad de los Andes
- Central Banks and Monetary Policy:Â University of Illinois Urbana-Champaign
- Vulnerability Scanning with Nmap: Network Scanning:Â Coursera Project Network
- Requirements Elicitation: Artifact and Stakeholder Analysis:Â University of Colorado System