Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "jagd auf cyber-bedrohungen"
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Mobile Security, Anomaly Detection, Criminal Investigation and Forensics, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Investigation, Cyber Attacks, File Systems, Intrusion Detection and Prevention, Fraud detection, Mobile Development, Cybersecurity, Applied Machine Learning, Malware Protection, Cyber Security Policies, Apple iOS, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Data Security
Status: NewStatus: Free TrialLearnQuest
Skills you'll gain: Penetration Testing, Metasploit, Safety Culture, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Security Assessment, Cybersecurity, Threat Detection, Generative AI, Security Testing, Vulnerability Scanning, Anomaly Detection, Data Security, Security Strategy, Network Security, Security Software, Change Management, Machine Learning Methods, Ethical Standards And Conduct, Data Visualization
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Responsible AI, Information Privacy, Personally Identifiable Information, Data Security, Anomaly Detection, Threat Modeling, Vulnerability Assessments, Cyber Security Strategy, Security Controls, Cyber Threat Hunting, Cybersecurity, Cyber Risk, Security Strategy, Cyber Governance, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Security Management, Security Software, AI Product Strategy, Generative AI
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Responsible AI, Information Privacy, Personally Identifiable Information, Data Security, Threat Modeling, Vulnerability Assessments, Data Ethics, Data Governance, Data Management, Cyber Security Strategy, Data Integrity, Data Loss Prevention, Cloud Security, Cybersecurity, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Security Management, Security Controls, Cyber Operations, Data Science
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Responsible AI, Cryptography, DevSecOps, Encryption, Secure Coding, Data Security, Cybersecurity, Key Management, Network Security, Public Key Infrastructure, Data Encryption Standard, Cloud-Native Computing, Security Controls, Application Security, Cloud Security, CI/CD, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Software Development, Software Architecture
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Incident Response, Incident Management, Threat Modeling, Cyber Governance, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Threat Management, Cyber Risk, Cyber Security Policies, Cybersecurity, Intrusion Detection and Prevention, Governance Risk Management and Compliance, Cyber Security Assessment, Cyber Operations, Compliance Management, Governance, Risk Management, Risk Control
What brings you to Coursera today?
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Cryptography, Identity and Access Management, Information Privacy, AWS Identity and Access Management (IAM), Encryption, Personally Identifiable Information, Data Security, Authentications, User Provisioning, Cybersecurity, Threat Modeling, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Cyber Attacks, Computer Security, Cyber Security Strategy, Data Management, Security Management, Cyber Risk, Security Awareness
Status: Free TrialJohns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Fraud detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Security Strategy, Threat Modeling, Email Security, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
Status: Free TrialUniversity of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
Status: Free TrialInfosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management, Cyber Threat Intelligence, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity, Network Analysis, Analysis
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Incident Response, Incident Management, Cyber Governance, Computer Security Incident Management, Security Awareness, Cyber Security Strategy, Law, Regulation, and Compliance, Cyber Attacks, Security Management, Security Strategy, Culture Transformation, Cyber Security Policies, Intrusion Detection and Prevention, Mobile Security, Threat Detection, Disaster Recovery, Cybersecurity, Cyber Risk, Cyber Operations, Cyber Security Assessment
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Cyber Governance, Security Awareness, Law, Regulation, and Compliance, Security Strategy, Human Factors (Security), Culture Transformation, Cyber Attacks, Mobile Security, Cyber Risk, Enterprise Security, Data Ethics, Cyber Security Strategy, Cybersecurity, Strategic Leadership, Cyber Operations, Leadership and Management, Leadership, Organizational Leadership, Leadership Development, Team Leadership
In summary, here are 10 of our most popular jagd auf cyber-bedrohungen courses
- Cyber Security: Essentials for Forensics:Â Macquarie University
- Generative AI for Cybersecurity:Â LearnQuest
- Cyber Security: Essentials for AI:Â Macquarie University
- Cyber Security: Data, Privacy and AI Security:Â Macquarie University
- Cyber Security: DevOps:Â Macquarie University
- Cyber Security: Essentials for Governance, Risk & Compliance:Â Macquarie University
- Cyber Security: Data & Identity Security:Â Macquarie University
- AI for Cybersecurity:Â Johns Hopkins University
- Cyber Security – Technology and Governance: University of London
- Cyber Incident Response:Â Infosec










