Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber operations"
Skills you'll gain: Software Development Life Cycle, Agile Software Development, User Story, Sprint Retrospectives, Agile Methodology, DevOps, Kanban Principles, Development Environment, Information Technology, Software Engineering, Computer Hardware, Agile Project Management, Software Architecture, Software Design, Sprint Planning, Cloud Computing, Backlogs, Cloud-Native Computing, Programming Principles, Scrum (Software Development)
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, Linux Servers, File Systems, Routing Protocols, OSI Models, Application Development, TCP/IP, General Networking, Scripting, MySQL, Data Structures
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cryptography, Cyber Security Assessment, Cyber Risk, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Security Policies, Infrastructure Security, Security Awareness, Identity and Access Management
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Risk Analysis, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Information Systems Security, Computer Security Awareness Training, Risk Management, Vulnerability Assessments, Enterprise Security
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Cryptographic Protocols, Data Security, Email Security, Computer Security Awareness Training, Advanced Encryption Standard (AES), Security Awareness, Key Management, Secure Coding, Technical Support and Services, Information Technology, Cyber Security Strategy
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Planning And Design, Network Security, Network Architecture, General Networking, Network Performance Management, Computer Networking, Wireless Networks, Software-Defined Networking, Algorithms, System Programming, Data Integrity, Virtualization
Rutgers the State University of New Jersey
Skills you'll gain: Health Care Administration, Governance, Business Process, Business Process Management, Quality Improvement, Health Systems, Process Improvement, Continuous Quality Improvement (CQI), Process Design, Patient Flow, Data Collection, Health Information Management and Medical Records, Electronic Medical Record, Care Coordination, Presentations, Health Care, Healthcare Industry Knowledge, Patient Coordination, Data Quality, Patient Safety
- Status: Free
Duke University
Skills you'll gain: Probability, Bayesian Statistics, Calculus, Graphing, Data Science, Algebra, Arithmetic, Derivatives
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Firewall, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Vulnerability Assessments, Cloud Computing, System Configuration
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
Johns Hopkins University
Skills you'll gain: Clinical Trials, Clinical Research, Regulatory Compliance, Patient Safety, Risk Management, Science and Research, Medical Science and Research, Scientific Methods, Record Keeping
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
In summary, here are 10 of our most popular cyber operations courses
- IBM IT Scrum Master:Â IBM
- Akamai Network Engineering:Â Akamai Technologies, Inc.
- Cybersecurity and Its Ten Domains:Â Kennesaw State University
- Cybersecurity for Business:Â University of Colorado System
- Cybersecurity Fundamentals:Â IBM
- Computer Communications:Â University of Colorado System
- Healthcare Organization Operations:Â Rutgers the State University of New Jersey
- Data Science Math Skills:Â Duke University
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks
- Cyber Security – Technology and Governance: Royal Holloway, University of London