Filter by
The language used throughout the course, in both instruction and assessments.
Results for "vulnerability assessment"
- Status: Free
University of Copenhagen
Skills you'll gain: Sanitation, Water Resources, Environment and Resource Management, Environmental Issue, Environmental Monitoring, Environmental Policy, Natural Resource Management, Sustainability Reporting, Waste Minimization, Pollution Prevention, Hospitality, Economic Development, Infectious Diseases
Rutgers the State University of New Jersey
Skills you'll gain: Supplier Management, Purchasing, Procurement, Supplier Relationship Management, Strategic Sourcing, Supply Chain Management
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
Skills you'll gain: Backlogs, Requirements Management, User Requirements Documents, Performance Measurement, Requirements Analysis, Business Analysis, Root Cause Analysis, Project Performance, Performance Analysis, Jira (Software), Solution Architecture, Process Improvement, Data-Driven Decision-Making, Prioritization, Change Management, Stakeholder Management
Skills you'll gain: Threat Modeling, Cloud Security, Internet Of Things, Infrastructure Security, Vulnerability Management, Information Systems Security, Incident Response, Identity and Access Management, Threat Management, Penetration Testing, Network Security, Vulnerability Scanning, Cloud Computing, Cloud Computing Architecture, Threat Detection, Embedded Software, Authentications, Authorization (Computing)
University of Pennsylvania
Skills you'll gain: Peer Review, Engineering Design Process, Prototyping, Conceptual Design, Design, Product Design, Aesthetics, Technical Drawing, Design Thinking, Human Centered Design, Needs Assessment, Ideation, Problem Solving
Kennesaw State University
Skills you'll gain: Internet Of Things, Cybersecurity, Cyber Security Strategy, Cyber Security Policies, Mobile Security, Security Awareness, Wireless Networks, Information Privacy, Emerging Technologies, Cyber Security Assessment, Enterprise Security, Embedded Software, Risk Management Framework
Johns Hopkins University
Skills you'll gain: Epidemiology, Health Assessment, Health Systems, Infectious Diseases, Program Evaluation, Data Collection, Descriptive Analytics, Statistics, Data Quality
University of Pennsylvania
Skills you'll gain: Demography, Return On Investment, Market Trend, Environmental Social And Corporate Governance (ESG), Corporate Sustainability, Project Scoping, Trend Analysis, Entrepreneurship, Strategic Leadership, Business Strategies, Feasibility Studies, International Relations, Business Ethics, Needs Assessment, Risk Control, Customer Analysis, Socioeconomics, Compliance Management, Governance, Ethical Standards And Conduct
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Cybersecurity, Threat Modeling, Malware Protection, Penetration Testing, Threat Detection, Cyber Attacks, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Awareness, Lightweight Directory Access Protocols, Network Protocols
Skills you'll gain: Programming Principles, C++ (Programming Language), Computer Programming, Integrated Development Environments, Pseudocode
Johns Hopkins University
Skills you'll gain: Epidemiology, Health Systems, System Monitoring, Health Assessment, Continuous Monitoring, Program Evaluation, Infectious Diseases, Data Quality, Data Collection
In summary, here are 10 of our most popular vulnerability assessment courses
- Sustainable Tourism – promoting environmental public health: University of Copenhagen
- Procurement & Sourcing Introduction: Rutgers the State University of New Jersey
- Secure Coding Practices: University of California, Davis
- Advanced Requirements Management & Solution Evaluation: Starweaver
- Securing the IoT Landscape: From Inception to Architecture: LearnQuest
- Design: Creation of Artifacts in Society: University of Pennsylvania
- Cybersecurity and the Internet of Things: Kennesaw State University
- Data and Health Indicators in Public Health Practice: Johns Hopkins University
- Business Strategies for A Better World: University of Pennsylvania
- System Hacking, Malware Threats, and Network Attacks: Packt