Filtern nach
BetreffErforderlich
SpracheErforderlich
Die im gesamten Kurs, sowohl für Anweisungen als auch Bewertungen, verwendete Sprache.
LernproduktErforderlich
NiveauErforderlich
DauerErforderlich
UntertitelErforderlich
LehrkraftErforderlich
Erkunden Sie den Cybersicherheits-Kurskatalog
- Status: Kostenloser Testzeitraum
Johns Hopkins University
Kompetenzen, die Sie erwerben: Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Vulnerability Assessments, Docker (Software)
- Status: Kostenloser TestzeitraumStatus: KI-Fähigkeiten
Microsoft
Kompetenzen, die Sie erwerben: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, Operating Systems, Collaborative Software, System Support, Network Protocols, TCP/IP, Application Security, Microsoft Teams, Cloud Computing
- Status: NeuStatus: Kostenloser Testzeitraum
Kompetenzen, die Sie erwerben: Penetration Testing, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Security Engineering, Cyber Threat Intelligence, Information Systems Security, Software Installation
- Status: NeuStatus: Vorschau
Macquarie University
Kompetenzen, die Sie erwerben: Information Privacy, Personally Identifiable Information, Data Security, Cybersecurity, Threat Modeling, General Data Protection Regulation (GDPR), Data Integrity, Data Governance, Data Ethics, Cyber Risk, Vulnerability Assessments, Vulnerability, Security Management, Security Software, Data Encryption Standard, Risk Management, Security Strategy, Compliance Management, Data Access, NIST 800-53
- Status: NeuStatus: Vorschau
Macquarie University
Kompetenzen, die Sie erwerben: Authentications, Identity and Access Management, Single Sign-On (SSO), Security Assertion Markup Language (SAML), Multi-Factor Authentication, User Provisioning, OAuth, Threat Modeling, Authorization (Computing), IT Security Architecture, Threat Management, Zero Trust Network Access, Cybersecurity, Systems Architecture, Role-Based Access Control (RBAC), Vulnerability Assessments, Cryptography, Threat Detection, Remote Access Systems, Risk Management
- Status: Kostenloser TestzeitraumStatus: KI-Fähigkeiten
Microsoft
Kompetenzen, die Sie erwerben: Microsoft 365, Network Security, Cloud Management, Microsoft Azure, Business Software, Computer Hardware, Virtual Machines, Identity and Access Management, Cybersecurity, Network Troubleshooting, Desktop Support, Virtual Private Networks (VPN), Azure Active Directory, Technical Support, Hardware Troubleshooting, Hardware Architecture, System Monitoring, Disaster Recovery, Cloud Computing, Network Protocols
- Status: NeuStatus: Vorschau
Macquarie University
Kompetenzen, die Sie erwerben: Incident Response, Incident Management, Computer Security Incident Management, Cyber Security Strategy, Security Management, Cyber Attacks, Intrusion Detection and Prevention, Cyber Risk, Cyber Security Policies, Disaster Recovery, Threat Detection, Crisis Management, Cybersecurity, Cyber Security Assessment, Threat Management, Business Continuity, Safety and Security, Strategic Communication, Security Software, Regulation and Legal Compliance
- Status: NeuStatus: Vorschau
Macquarie University
Kompetenzen, die Sie erwerben: Cryptography, Encryption, Network Security, Advanced Encryption Standard (AES), Cybersecurity, Data Security, Public Key Infrastructure, Data Encryption Standard, Blockchain, Security Engineering, Virtual Private Networks (VPN), Intellectual Property, Security Management, Wireless Networks, Authentications, Emerging Technologies, Hardware Architecture
- Status: NeuStatus: Vorschau
Macquarie University
Kompetenzen, die Sie erwerben: Anomaly Detection, Intrusion Detection and Prevention, Applied Machine Learning, Malware Protection, Cyber Threat Intelligence, Cyber Security Strategy, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Cybersecurity, Threat Detection, MLOps (Machine Learning Operations), Machine Learning, Network Security, Machine Learning Algorithms, Network Analysis, Artificial Intelligence, Data-Driven Decision-Making, Artificial Neural Networks
- Status: NeuStatus: Vorschau
Macquarie University
Kompetenzen, die Sie erwerben: Cyber Threat Intelligence, Security Testing, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Information Systems Security, Threat Modeling, Security Engineering, DevSecOps, Data Security, Cyber Governance, Artificial Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Risk Management, Encryption, Machine Learning, Application Programming Interface (API), Regulation and Legal Compliance, Governance, Applied Machine Learning
- Status: NeuStatus: Vorschau
Macquarie University
Kompetenzen, die Sie erwerben: Mobile Security, Investigation, Criminal Investigation and Forensics, Mobile Development, Android (Operating System), Application Security, Apple iOS, Legal Proceedings, Computer Security, Malware Protection, File Systems, Cybersecurity, Secure Coding, Computer Security Incident Management, Cloud Security, Analysis, Disaster Recovery, Security Strategy, Debugging, Encryption
- Status: NeuStatus: Vorschau
Macquarie University
Kompetenzen, die Sie erwerben: Criminal Investigation and Forensics, Investigation, Mobile Security, File Systems, Data Security, Cybersecurity, Data Ethics, Data Integrity, File Management, Computer Security Incident Management, Incident Response, Disaster Recovery, Malware Protection, Data Storage, Network Analysis, Regulation and Legal Compliance, Mac OS
Zusammenfassend finden Sie hier 10 unsere beliebtesten cybersecurity Kurse
- Cybersecurity Foundations: Threats Networks, and IoT Protection: Johns Hopkins University
- Microsoft IT Support Specialist: Microsoft
- Exploitation and Penetration Testing with Metasploit: IBM
- Data Security & Information Privacy: Macquarie University
- Identity Access Management (IAM) and Secure Authentication: Macquarie University
- Microsoft Cloud Support Associate: Microsoft
- Cyber Response and Recovery: Macquarie University
- Applied Cryptography & Information Security: Macquarie University
- AI for Cyber Security: Macquarie University
- AI Security: Risks, Defences and Safety: Macquarie University