Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber operations"
Rutgers the State University of New Jersey
Skills you'll gain: Lean Six Sigma, Lean Manufacturing, Manufacturing Operations, Process Improvement, Operations Management, Six Sigma Methodology, Operational Efficiency, Quality Improvement, Kanban Principles, Inventory Management System
University of Virginia
Skills you'll gain: Design Thinking, Digital Transformation, Creative Problem-Solving, New Product Development, Ideation, Business Transformation, Product Management, Technology Strategies, Agile Product Development, Innovation, Creativity, Product Lifecycle Management, Strategic Thinking, Product Improvement, Market Opportunities, Information Technology, Competitive Analysis, Business Analysis, Business Strategy, Cyber Risk
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Law, Regulation, and Compliance, Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cryptography, Cyber Security Assessment, Cyber Risk, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Security Policies, Infrastructure Security, Security Awareness, Identity and Access Management
Skills you'll gain: MLOps (Machine Learning Operations), AWS SageMaker, Amazon Web Services, Scalability, Machine Learning, Technical Design, Amazon Elastic Compute Cloud, Cloud Computing, AWS Identity and Access Management (IAM), Cloud Security, Disaster Recovery, Data Security
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cybersecurity, Computing Platforms, Hardware Troubleshooting, Computer Hardware, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Peripheral Devices, Cloud Platforms, Encryption, Data Storage, Cyber Attacks, Software Development Life Cycle, Application Development, General Networking, Information Technology, Cloud Computing, Databases
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Cyber Governance, Risk Mitigation, Vendor Management, Risk Modeling, Threat Management, Vulnerability Assessments, Security Management, Cyber Risk, Compliance Management, Cyber Security Policies, Cybersecurity, Security Awareness, Cyber Security Strategy
Skills you'll gain: CI/CD, Open Web Application Security Project (OWASP), Istio, Continuous Integration, Agile Software Development, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Jenkins, Code Coverage, OpenShift, Cloud Applications, Containerization, Agile Methodology, Behavior-Driven Development, DevOps, Secure Coding, Grafana, System Monitoring
Salesforce
Skills you'll gain: Sales Pipelines, Sales Process, Customer Success Management, Order Management, Sales Management, Sales Support, Salesforce, Dashboard, Sales, Sales Development, Customer Relationship Management (CRM) Software, Sales Operations, Lead Generation, Request For Quotation (RFQ), Customer Relationship Management, Product Knowledge, B2B Sales, Campaign Management, Data Visualization, Sales Training
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Malware Protection, Vulnerability Assessments, Operating Systems, OS Process Management
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Presentation, Data Security, Data Migration, Database Design, Data Visualization, Data Governance, MySQL, Interactive Data Visualization, Extract, Transform, Load, Cloud Storage, Data Visualization Software, Relational Databases, Stored Procedure, Data Architecture, Excel Formulas, Microsoft Excel
In summary, here are 10 of our most popular cyber operations courses
- Supply Chain Operations:Â Rutgers the State University of New Jersey
- Leading the Modern Day Business:Â University of Virginia
- Cybersecurity: Developing a Program for Your Business:Â Kennesaw State University
- Cybersecurity and Its Ten Domains:Â Kennesaw State University
- Machine Learning Implementation and Operations in AWS:Â Whizlabs
- Information Technology (IT) and Cloud Fundamentals:Â IBM
- Introduction to Cybersecurity & Risk Management:Â University of California, Irvine
- IBM Applied DevOps Engineering:Â IBM
- Salesforce Sales Operations:Â Salesforce
- Introduction to Applied Cryptography:Â University of Colorado System