Filter by
The language used throughout the course, in both instruction and assessments.
Results for "vulnerability assessments"
University of Colorado Boulder
Skills you'll gain: Crisis Management, Systems Thinking, Leadership, Strategic Communication, Threat Management, Change Management, Threat Detection, Organizational Leadership, Infrastructure Security, Business Continuity, Disaster Recovery, Organizational Change, Engineering Management, Emergency Response, Contingency Planning, Business Ethics, Communication, Risk Analysis, Complex Problem Solving, Decision Making
Imperial College London
Skills you'll gain: Health Systems, Health Assessment, Policy Analysis, Health Care Administration, Healthcare Industry Knowledge, Public Policies, Program Evaluation, Human Services, Economics, Policy, and Social Studies, Research
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Vulnerability Scanning, Encryption, Key Management, Virtual Machines
University of Michigan
Skills you'll gain: Generative AI, Ideation, ChatGPT, Persona Development, Course Development, Persona (User Experience), Data Ethics, Design Thinking, Artificial Intelligence, Design Strategies, Technology Strategies
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Computer Security, Security Controls, Vulnerability Assessments, Identity and Access Management
Johns Hopkins University
Skills you'll gain: Trigonometry, Systems Of Measurement, Geometry, Mathematical Modeling, Graphing, Algebra, Applied Mathematics
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, Application Security, IT Security Architecture, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
Macquarie University
Skills you'll gain: Business Strategy, Customer Analysis, Strategic Marketing, Growth Strategies, Competitive Analysis, Business Planning, Market Analysis, Technology Strategies, Strategic Decision-Making, Value Propositions, Organizational Effectiveness, Analysis, Trend Analysis
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Penetration Testing, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Personally Identifiable Information, Identity and Access Management, Web Applications, Data Validation
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Role-Based Access Control (RBAC), Containerization
Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Vulnerability Management, Threat Modeling, Risk Management Framework, Security Management, Information Systems Security, Vulnerability Assessments, Information Assurance, Cybersecurity, Cyber Security Policies, Security Controls, Continuous Monitoring, Disaster Recovery, Technical Communication
University of California, Irvine
Skills you'll gain: Peer Review, Instructional Design, Instructional Strategies, Course Development, Developing Training Materials, Curriculum Development, Blended Learning, Student Engagement, Ability To Meet Deadlines
In summary, here are 10 of our most popular vulnerability assessments courses
- Resilience Engineering and Leadership in Crisis:Â University of Colorado Boulder
- Health Systems Development: Health systems, Policy and Research:Â Imperial College London
- Security Best Practices in Google Cloud:Â Google Cloud
- Generative AI as a Learning Design Partner:Â University of Michigan
- Advanced Cybersecurity Concepts and Capstone Project:Â Microsoft
- Precalculus: Periodic Functions:Â Johns Hopkins University
- Cyber Security Technologies:Â Illinois Tech
- Strategic management: Be competitive:Â Macquarie University
- Identifying Security Vulnerabilities:Â University of California, Davis
- Cloud Security Risks: Identify and Protect Against Threats:Â Google Cloud