Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability remediation guidance"
The State University of New York
Skills you'll gain: Business Writing, Personal Attributes, Concision, Organizational Skills, Professional Development, Peer Review, Action Oriented, Talent Recruitment, Detail Oriented
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
- Status: AI skills
Microsoft
Skills you'll gain: Storyboarding, User Research, Information Architecture, User Experience Design, Design Thinking, Prototyping, Usability Testing, Persona (User Experience), Wireframing, Design Research, User Interface and User Experience (UI/UX) Design, Interaction Design, Web Content Accessibility Guidelines, Human Centered Design, Usability, User Interface (UI) Design, User Centered Design, Figma (Design Software), Design, Mockups
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Stakeholder Communications, Incident Response, Intrusion Detection and Prevention, Threat Management, Business Risk Management, Network Security, Vulnerability Assessments, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Computer Security Incident Management, Security Awareness, Bash (Scripting Language), Event Monitoring, Security Controls, Cybersecurity, Debugging
Rice University
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Intelligence, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Vulnerability Assessments, Encryption, Information Systems Security, Threat Management, Threat Detection
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Strategic Decision-Making, Business Valuation, Private Equity, Mergers & Acquisitions, Game Theory, Corporate Strategy, Financial Analysis, Business Strategy, Investment Banking, Financial Modeling, Cash Flows, Growth Strategies, Corporate Finance
- Status: New
DeepLearning.AI
Skills you'll gain: Artificial Intelligence, Jupyter, Python Programming, Data Analysis, OpenAI, Application Development, Generative AI, Scripting, Automation, Computer Programming, Application Programming Interface (API), Development Environment, Debugging
Hebrew University of Jerusalem
Skills you'll gain: Computer Architecture, Hardware Architecture, Computer Engineering, Computer Hardware, Computational Logic, Systems Architecture, Computer Programming, System Design and Implementation, Program Development, Data Storage
Skills you'll gain: Stakeholder Management, IT Management, Project Management, Project Coordination, Agile Project Management, Project Management Life Cycle, Relationship Management, Agile Methodology, Risk Management, Interpersonal Communications, Communication
University of Michigan
Skills you'll gain: Influencing, Persuasive Communication, Leadership, Leadership Development, Professional Networking, Executive Presence, Relationship Building, Public Speaking, Rapport Building, Decision Making, People Development, Stakeholder Management, Business Ethics
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Firewall, Threat Detection, Incident Response, Encryption
In summary, here are 10 of our most popular vulnerability remediation guidance courses
- How to Write a Resume (Project-Centered Course):Â The State University of New York
- Application Security for Developers and DevOps Professionals:Â IBM
- Microsoft UX Design:Â Microsoft
- Ciberseguridad de Google:Â Google
- Engineering Project Management: Initiating and Planning:Â Rice University
- Cybersecurity Operations Fundamentals:Â Cisco Learning and Certifications
- Advanced Valuation and Strategy - M&A, Private Equity, and Venture Capital:Â Erasmus University Rotterdam
- AI Python for Beginners:Â DeepLearning.AI
- Build a Modern Computer from First Principles: From Nand to Tetris (Project-Centered Course):Â Hebrew University of Jerusalem
- Introduction to Project Management :Â IBM