Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber operations"
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Threat Management, Security Controls, Threat Detection, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Cyber Security Assessment, Data Security, Network Security, Enterprise Security, Information Assurance, Incident Response, Data Integrity
Tecnológico de Monterrey
Skills you'll gain: Lean Six Sigma, Process Capability, Lean Manufacturing, Process Analysis, Process Mapping, Six Sigma Methodology, Statistical Process Controls, Process Improvement, Lean Methodologies, Quality Improvement, Process Optimization, Operational Analysis, Business Process, Quality Control, Statistical Analysis, Continuous Improvement Process, Value Engineering, Analysis, Predictive Modeling, Production Process
Skills you'll gain: Kubernetes, Cloud-Native Computing, Google Cloud Platform, Application Deployment, Scalability, Load Balancing, Cloud Infrastructure, Containerization, Cloud Computing, YAML, Data Storage, Secure Coding, General Networking
EIT Digital
Skills you'll gain: Embedded Systems, Embedded Software, Internet Of Things, Operating Systems, Wireless Networks, System Software, Computer Systems, Simulations, C (Programming Language), Network Protocols, Application Programming Interface (API), Peripheral Devices
- Status: New
Microsoft
Skills you'll gain: Unsupervised Learning, Generative AI, Data Management, Natural Language Processing, MLOps (Machine Learning Operations), Supervised Learning, Microsoft Azure, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Infrastructure Architecture, Data Infrastructure, Applied Machine Learning, Reinforcement Learning, Data Ethics, Artificial Intelligence, Test Case, OpenAI, Human Computer Interaction, Performance Testing, Application Deployment
University of Leeds
Skills you'll gain: Test Case, Software Testing, Software Quality Assurance, Quality Assurance, Test Planning, Verification And Validation, Acceptance Testing, Functional Testing, Usability Testing, Performance Testing, Software Development Life Cycle
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Emory University
Skills you'll gain: Financial Statement Analysis, Financial Statements, Financial Analysis, Income Statement, Balance Sheet, Finance, Risk Management, Financial Management, Microsoft Excel, Accounting, Return On Investment, General Finance, Cash Flows, Investments
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Security Management, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Cyber Attacks, Malware Protection, Email Security, Vulnerability Management, Artificial Intelligence
- Status: Free
Coursera Instructor Network
Skills you'll gain: Governance, Stakeholder Engagement, Regulatory Compliance, Compliance Management, Risk Management, Business Ethics, Corporate Strategy, Corporate Communications, Environmental Social And Corporate Governance (ESG), Ethical Standards And Conduct, Organizational Structure, Accountability, Financial Reporting
EC-Council
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Security Awareness, Cyber Threat Intelligence, Cybersecurity, Intrusion Detection and Prevention, Cyber Attacks, Application Security, Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
In summary, here are 10 of our most popular cyber operations courses
- Cybersecurity Best Practices:Â Coursera Instructor Network
- Lean Six Sigma: Tecnológico de Monterrey
- Architecting with Google Kubernetes Engine: Workloads:Â Google Cloud
- Embedded Hardware and Operating Systems:Â EIT Digital
- Microsoft AI & ML Engineering:Â Microsoft
- Foundations of Software Testing and Validation:Â University of Leeds
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- Finance for Non-Financial Managers:Â Emory University
- Incident Response and Digital Forensics:Â IBM
- Cybersecurity Case Studies and Capstone Project:Â IBM