Filter by
The language used throughout the course, in both instruction and assessments.
Results for "vulnerability assessments"
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Continuous Integration, Software Configuration Management, Software Development Tools, Code Review, Remote Access Systems, Issue Tracking, Command-Line Interface
Kennesaw State University
Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Cyber Threat Intelligence, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Risk Modeling
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Application Security, Vulnerability Assessments, Vulnerability Management, Event Monitoring, Security Controls, Data Integrity, Patch Management, Network Security
- Status: [object Object]
Microsoft
Skills you'll gain: Earned Value Management, Stakeholder Engagement, Project Closure, Stakeholder Management, Team Performance Management, Team Building, Agile Methodology, Risk Analysis, Agile Project Management, Stakeholder Communications, Project Management Institute (PMI) Methodology, Systems Thinking, Project Risk Management, Project Implementation, Project Performance, Project Planning, Team Management, Virtual Teams, Project Schedules, Project Management Life Cycle
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Stakeholder Communications, Incident Response, Intrusion Detection and Prevention, Threat Management, Business Risk Management, Network Security, Vulnerability Assessments, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Computer Security Incident Management, Security Awareness, Bash (Scripting Language), Event Monitoring, Security Controls, Cybersecurity, Debugging
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Skills you'll gain: Incident Response, Business Continuity Planning, Continuous Monitoring, Disaster Recovery, Threat Management, Risk Analysis, Risk Mitigation, Vulnerability Scanning, Security Information and Event Management (SIEM), Vulnerability Assessments, Investigation, Penetration Testing
- Status: Free
University of London
Skills you'll gain: Graphical Tools, Media Production, Virtual Environment, Technology Solutions
Arizona State University
Skills you'll gain: Lesson Planning, Peer Review, Teaching, Pedagogy, Curriculum Planning, Instructing, Learning Strategies, Instructional Strategies, Motivational Skills, Educational Materials, Learning Styles, Language Learning, Performance Review, Design Elements And Principles, Learning Theory, Design Strategies, Lifelong Learning, Grammar, Public Speaking, Stress Management
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Endpoint Security, Threat Detection, Incident Response
- Status: Free
DeepLearning.AI
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Security Testing, Vulnerability Management, Threat Modeling, Cyber Security Assessment, Application Security
- Status: [object Object]
Google Cloud
Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Generative AI, DevSecOps, Cloud Computing, Data Security, Google Cloud Platform, Cybersecurity
In summary, here are 10 of our most popular vulnerability assessments courses
- Introduction to Git and GitHub:Â Google
- Cybersecurity Risk Management Frameworks:Â Kennesaw State University
- OWASP Top 10 - Risks 6-10:Â Infosec
- Microsoft Project Management:Â Microsoft
- Ciberseguridad de Google:Â Google
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery :Â ISC2
- Get Interactive: Practical Teaching with Technology:Â University of London
- TESOL Certificate, Part 1: Teach English Now!:Â Arizona State University
- Cybersecurity Solutions and Microsoft Defender:Â Microsoft