Filter by
The language used throughout the course, in both instruction and assessments.
Results for "vulnerability assessment"
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
Skills you'll gain: Data Ethics, Incident Response, Security Awareness, Computer Security Incident Management, Incident Management, Cybersecurity, Security Management, Cyber Security Policies, Computer Security Awareness Training, Artificial Intelligence, Technical Communication
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
University of Colorado Boulder
Skills you'll gain: Kinesiology, Physical Therapy, Behavioral Health, Health Assessment, Preventative Care, Blood Pressure, Respiration, Anatomy, Life Sciences, Stress Management, Vital Signs, Injury Prevention, Pharmaceuticals, Risk Analysis
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Business Analytics, Spreadsheet Software, Data Sharing, Data Cleansing, Data Processing, Data Visualization Software, Ethical Standards And Conduct, SQL
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Crisis Management, Incident Response, OpenAI, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Threat Management, Expense Management, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Creative Thinking, Creativity
Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Data Security, Application Security, Vulnerability Management, Threat Detection, Malware Protection, Infrastructure Security, Continuous Monitoring, IT Automation, Identity and Access Management
- Status: [object Object]
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
- Status: Free
Knowledge Accelerators
Skills you'll gain: Power BI, Dashboard, Data Presentation, Data Visualization Software, Interactive Data Visualization, Data Import/Export, Business Intelligence, Microsoft Excel, Data Analysis, Data-Driven Decision-Making, Data Modeling
University of Illinois Urbana-Champaign
Skills you'll gain: Financial Auditing, Auditing, Auditors Report, External Auditing, Certified Public Accountant, Financial Reporting, Internal Controls, Quality Assessment, Ethical Standards And Conduct, Financial Statements, Risk Analysis
In summary, here are 10 of our most popular vulnerability assessment courses
- IBM Cybersecurity Analyst:Â IBM
- IT Fundamentals for Cybersecurity:Â IBM
- Application Security for Developers and DevOps Professionals:Â IBM
- Put It to Work: Prepare for Cybersecurity Jobs:Â Google
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Science of Exercise:Â University of Colorado Boulder
- Foundations: Data, Data, Everywhere:Â Google
- Generative AI Cybersecurity & Privacy for Leaders:Â Vanderbilt University
- Mitigating Security Vulnerabilities on Google Cloud:Â Google Cloud
- Microsoft Cybersecurity Analyst:Â Microsoft