Filtern nach
BetreffErforderlich
SpracheErforderlich
Die im gesamten Kurs, sowohl für Anweisungen als auch Bewertungen, verwendete Sprache.
LernproduktErforderlich
NiveauErforderlich
DauerErforderlich
UntertitelErforderlich
LehrkraftErforderlich
Erkunden Sie den Cybersicherheits-Kurskatalog
Status: Kostenloser TestzeitraumUniversity of Colorado System
Kompetenzen, die Sie erwerben: Technologie-Lösungen, Rahmen für das Risikomanagement, Reaktion auf Vorfälle, Rechtliches Risiko, Cybersicherheit, Cyber-Risiko, Sicherheit der Infrastruktur, Cyber-Governance, Cyber-Sicherheitsstrategie, Cyber-Operationen, Cyber-Sicherheitsrichtlinien, Cyber-Angriffe

Kennesaw State University
Kompetenzen, die Sie erwerben: Cyber Security Policies, Cybersecurity, Incident Response, Cyber Attacks, Computer Security Awareness Training, Network Security, Security Awareness, Remote Access Systems, Mobile Security, Malware Protection, Human Factors (Security), Email Security, Identity and Access Management
Status: VorschauEdureka
Kompetenzen, die Sie erwerben: Cyber Security Assessment, Malware Protection, Automation, Human Machine Interfaces
Status: Kostenloser TestzeitraumJohns Hopkins University
Kompetenzen, die Sie erwerben: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
Status: Kostenloser TestzeitraumMicrosoft
Kompetenzen, die Sie erwerben: Anomalie-Erkennung, Datenethik, Schnelles Engineering, Generative KI, Künstliche Intelligenz, Cybersicherheit, LLM-Bewerbung, Aufkommende Technologien, Bildanalyse, Generative Modellarchitekturen, Erkennung von Bedrohungen, Systemüberwachung, Verantwortungsvolle KI
Status: NeuStatus: Kostenloser TestzeitraumLearnKartS
Kompetenzen, die Sie erwerben: Incident Response, Vulnerability Management, Computer Security Incident Management, Cyber Operations, Hardening, Cybersecurity, Security Controls, Vulnerability Assessments, Threat Detection, Identity and Access Management, Intrusion Detection and Prevention, IT Security Architecture, Information Systems Security, Vulnerability Scanning, Threat Management, Application Security, Mobile Security, Network Security, Authorization (Computing), Continuous Monitoring
Status: NeuStatus: Kostenloser TestzeitraumLearnKartS
Kompetenzen, die Sie erwerben: Cybersecurity, Threat Management, Cyber Attacks, Threat Detection, Cloud Security, Disaster Recovery, Network Security, Malware Protection, Data Security, Intrusion Detection and Prevention, Hardening, Systems Architecture, Encryption
Status: NeuKompetenzen, die Sie erwerben: DevSecOps, Cyber Operations, Threat Modeling, AWS Identity and Access Management (IAM), Zero Trust Network Access, Encryption
Status: NeuStatus: VorschauKompetenzen, die Sie erwerben: Cyber Governance, Cyber Security Policies, Continuous Improvement Process, Business Risk Management, Governance Risk Management and Compliance, Enterprise Risk Management (ERM), Governance, Risk Management, Audit Planning, Cyber Security Strategy, Compliance Management, Cybersecurity, Key Performance Indicators (KPIs), Performance Measurement, Regulatory Compliance, Training Programs, Auditing, ISO/IEC 27001, NIST 800-53, General Data Protection Regulation (GDPR)
Status: NeuStatus: VorschauStarweaver
Kompetenzen, die Sie erwerben: Threat Detection, Identity and Access Management, Incident Response, Cybersecurity, Cyber Attacks, Cyber Security Strategy, Threat Management, Zero Trust Network Access, MITRE ATT&CK Framework, Security Awareness, Security Information and Event Management (SIEM), Security Controls, Endpoint Security, User Accounts, General Data Protection Regulation (GDPR)
Status: NeuStatus: Kostenloser TestzeitraumKompetenzen, die Sie erwerben: MITRE ATT&CK Framework, Penetration Testing, Incident Response, Cyber Threat Hunting, Cybersecurity, Cyber Threat Intelligence, DevSecOps, Cloud Security, Patch Management, Cyber Security Assessment, Exploitation techniques, Network Security, Computer Security Incident Management, Business Continuity, Cryptography, Responsible AI, Threat Modeling, Information Systems Security, DevOps, Disaster Recovery
Status: NeuStatus: Kostenloser TestzeitraumAdvancing Women in Tech
Kompetenzen, die Sie erwerben: ISO/IEC 27001, Budget Management, Cybersecurity, Cyber Governance, Cyber Security Strategy, Leadership Development, Cyber Risk, Security Management, Information Systems Security, Business Strategies, Strategic Leadership, Leadership and Management, Risk Management, Business Metrics, Vendor Management, Team Leadership, Compliance Auditing, Business Communication, Information Technology, Artificial Intelligence and Machine Learning (AI/ML)
Zusammenfassend finden Sie hier 10 unsere beliebtesten cybersecurity Kurse
- Innere Sicherheit und Cybersecurity Zukunft: University of Colorado System
- An Employee's Guide to Cybersecurity: Kennesaw State University
- Industrial Cybersecurity: Edureka
- Advanced Cybersecurity Techniques: Johns Hopkins University
- Copilot für Cybersecurity: Microsoft
- Cybersecurity Operations and Controls: LearnKartS
- Cybersecurity Threats and Defense: LearnKartS
- AI & Cybersecurity Threats, Global Actors, and Trends: Packt
- Cybersecurity Policy & Governance for Business Success : Starweaver
- Foundations of Cybersecurity Operations: Starweaver










