Filtrer par
ObjetObligatoire
LangueObligatoire
La langue utilisée tout au long du cours, tant dans l’enseignement que dans les évaluations.
Produit d'apprentissageObligatoire
NiveauObligatoire
DuréeObligatoire
Sous-titresObligatoire
ÉducateurObligatoire
Explorez le catalogue de cours de cybersécurité
- Statut : Essai gratuit
Johns Hopkins University
Compétences que vous acquerrez: Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Vulnerability Assessments, Docker (Software)
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Penetration Testing, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Security Engineering, Cyber Threat Intelligence, Information Systems Security, Software Installation
- Statut : Essai gratuitStatut : Compétences en IA
Microsoft
Compétences que vous acquerrez: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, Operating Systems, Collaborative Software, System Support, Network Protocols, TCP/IP, Application Security, Microsoft Teams, Cloud Computing
- Statut : Essai gratuitStatut : Compétences en IA
Microsoft
Compétences que vous acquerrez: Microsoft 365, Network Security, Cloud Management, Microsoft Azure, Business Software, Computer Hardware, Virtual Machines, Identity and Access Management, Cybersecurity, Network Troubleshooting, Desktop Support, Virtual Private Networks (VPN), Azure Active Directory, Technical Support, Hardware Troubleshooting, Hardware Architecture, System Monitoring, Disaster Recovery, Cloud Computing, Network Protocols
- Statut : NouveauStatut : Prévisualisation
Macquarie University
Compétences que vous acquerrez: Information Privacy, Personally Identifiable Information, Data Security, Cybersecurity, Threat Modeling, General Data Protection Regulation (GDPR), Data Integrity, Data Governance, Data Ethics, Cyber Risk, Vulnerability Assessments, Vulnerability, Security Management, Security Software, Data Encryption Standard, Risk Management, Security Strategy, Compliance Management, Data Access, NIST 800-53
- Statut : NouveauStatut : Prévisualisation
Macquarie University
Compétences que vous acquerrez: Authentications, Identity and Access Management, Single Sign-On (SSO), Security Assertion Markup Language (SAML), Multi-Factor Authentication, User Provisioning, OAuth, Threat Modeling, Authorization (Computing), IT Security Architecture, Threat Management, Zero Trust Network Access, Cybersecurity, Systems Architecture, Role-Based Access Control (RBAC), Vulnerability Assessments, Cryptography, Threat Detection, Remote Access Systems, Risk Management
- Statut : NouveauStatut : Prévisualisation
Macquarie University
Compétences que vous acquerrez: Incident Response, Incident Management, Computer Security Incident Management, Cyber Security Strategy, Security Management, Cyber Attacks, Intrusion Detection and Prevention, Cyber Risk, Cyber Security Policies, Disaster Recovery, Threat Detection, Crisis Management, Cybersecurity, Cyber Security Assessment, Threat Management, Business Continuity, Safety and Security, Strategic Communication, Security Software, Regulation and Legal Compliance
- Statut : NouveauStatut : Prévisualisation
Macquarie University
Compétences que vous acquerrez: Cryptography, Encryption, Network Security, Advanced Encryption Standard (AES), Cybersecurity, Data Security, Public Key Infrastructure, Data Encryption Standard, Blockchain, Security Engineering, Virtual Private Networks (VPN), Intellectual Property, Security Management, Wireless Networks, Authentications, Emerging Technologies, Hardware Architecture
- Statut : NouveauStatut : Prévisualisation
Macquarie University
Compétences que vous acquerrez: Cyber Threat Intelligence, Security Testing, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Information Systems Security, Threat Modeling, Security Engineering, DevSecOps, Data Security, Cyber Governance, Artificial Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Risk Management, Encryption, Machine Learning, Application Programming Interface (API), Regulation and Legal Compliance, Governance, Applied Machine Learning
- Statut : NouveauStatut : Prévisualisation
Macquarie University
Compétences que vous acquerrez: Anomaly Detection, Intrusion Detection and Prevention, Applied Machine Learning, Malware Protection, Cyber Threat Intelligence, Cyber Security Strategy, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Cybersecurity, Threat Detection, MLOps (Machine Learning Operations), Machine Learning, Network Security, Machine Learning Algorithms, Network Analysis, Artificial Intelligence, Data-Driven Decision-Making, Artificial Neural Networks
- Statut : NouveauStatut : Prévisualisation
Macquarie University
Compétences que vous acquerrez: Criminal Investigation and Forensics, Investigation, Mobile Security, File Systems, Data Security, Cybersecurity, Data Ethics, Data Integrity, File Management, Computer Security Incident Management, Incident Response, Disaster Recovery, Malware Protection, Data Storage, Network Analysis, Regulation and Legal Compliance, Mac OS
- Statut : NouveauStatut : Prévisualisation
Macquarie University
Compétences que vous acquerrez: Mobile Security, Investigation, Criminal Investigation and Forensics, Mobile Development, Android (Operating System), Application Security, Apple iOS, Legal Proceedings, Computer Security, Malware Protection, File Systems, Cybersecurity, Secure Coding, Computer Security Incident Management, Cloud Security, Analysis, Disaster Recovery, Security Strategy, Debugging, Encryption
En résumé, voici 10 de nos cours les plus populaires sur cybersecurity .
- Cybersecurity Foundations: Threats Networks, and IoT Protection: Johns Hopkins University
- Exploitation and Penetration Testing with Metasploit: IBM
- Microsoft IT Support Specialist: Microsoft
- Microsoft Cloud Support Associate: Microsoft
- Data Security & Information Privacy: Macquarie University
- Identity Access Management (IAM) and Secure Authentication: Macquarie University
- Cyber Response and Recovery: Macquarie University
- Applied Cryptography & Information Security: Macquarie University
- AI Security: Risks, Defences and Safety: Macquarie University
- AI for Cyber Security: Macquarie University