Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber operations"
Skills you'll gain: Network Security, Incident Response, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Configuration Management, Cybersecurity, Security Awareness, Security Management, Computer Security Incident Management, Cyber Attacks, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)
University of Pennsylvania
Skills you'll gain: Operations Management, Operational Efficiency, Process Analysis, Operational Performance Management, Process Improvement, Lean Methodologies, Workflow Management, Continuous Improvement Process, Capacity Planning, Quality Management, Business Workflow Analysis, Supply Chain Management, Inventory Management System, Statistical Process Controls, Process Flow Diagrams, Root Cause Analysis
- Status: [object Object]
Google
Skills you'll gain: Computer Networking, Network Troubleshooting, Package and Software Management, Systems Administration, Cloud Infrastructure, IT Infrastructure, TCP/IP, Desktop Support, Network Security, Network Architecture, Computer Hardware, Linux, Encryption, Microsoft Windows, Lightweight Directory Access Protocols, Cybersecurity, Security Awareness, Technical Support, Software Installation, Help Desk Support
New York University
Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
Skills you'll gain: Network Security, Encryption, Cybersecurity, Security Awareness, Cyber Attacks, Security Management, Security Strategy, Threat Detection, Firewall, Wireless Networks, Technical Support, Malware Protection, Authentications, Multi-Factor Authentication, Authorization (Computing), Generative AI
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Threat Intelligence, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Governance, Continuous Monitoring, Security Management, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Infrastructure Architecture
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Information Systems Security, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Personally Identifiable Information, Cloud Security
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Skills you'll gain: Cybersecurity, Encryption, Cyber Attacks, Email Security, Computer Security Awareness Training, Security Awareness, Data Security, Information Systems Security, Malware Protection, Authentications, Authorization (Computing), Security Controls, Hardening, Identity and Access Management, Multi-Factor Authentication, Browser Compatibility
Skills you'll gain: Cybersecurity, Technical Support and Services, Information Technology, Network Security, Cyber Security Strategy, Computer Security Awareness Training, Application Security, Security Management
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
In summary, here are 10 of our most popular cyber operations courses
- Certified in Cybersecurity:Â ISC2
- Introduction to Operations Management:Â University of Pennsylvania
- Google IT Support:Â Google
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- IT Security: Defense against the digital dark arts :Â Google
- Homeland Security and Cybersecurity:Â University of Colorado System
- IBM Cybersecurity Analyst:Â IBM
- Cyber Security in Manufacturing :Â University at Buffalo
- Cyber Attack Countermeasures:Â New York University
- Introduction to Cybersecurity Essentials:Â IBM