Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cyber security assessment"
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Application Security, Vulnerability Management, Secure Coding, Cybersecurity, Authorization (Computing), Cryptography, System Configuration, Encryption, Software Design, SQL
Lund University
Skills you'll gain: Law, Regulation, and Compliance, Compliance Management, Competitive Analysis, Mergers & Acquisitions, Advocacy, Persuasive Communication, Brand Management, Procurement, Innovation, Analysis
- Status: Free
EIT Digital
Skills you'll gain: General Data Protection Regulation (GDPR), Information Privacy, Personally Identifiable Information, Data Security, Data Management, Data Governance, Vulnerability Assessments, Big Data, Encryption
- Status: Free
The University of Melbourne
Skills you'll gain: Preventative Care, Human Development, Mental Health, Behavioral Health, Health Care, Community Development, Economics, Policy, and Social Studies, Public Policies, Advocacy, Social Sciences, Sociology, Student Engagement, Education and Training
Johns Hopkins University
Skills you'll gain: Verification And Validation, Research, Safety Assurance, Scientific Methods, Food Quality Assurance And Control, Biostatistics, Bioinformatics, Research Methodologies, Environment Health And Safety, General Science and Research, Research Design, Epidemiology, Risk Management, Risk Analysis, Quantitative Research, Data Synthesis, Statistical Methods
Rutgers the State University of New Jersey
Skills you'll gain: Market Analysis, Supply Management, Supplier Management, Competitive Analysis, Strategic Sourcing, Financial Analysis, Market Dynamics, Supply Chain Management, Market Intelligence, Business Strategy
Skills you'll gain: File Systems, Operating Systems, Data Integrity, Debugging, Systems Design, Distributed Computing, Data Storage, C (Programming Language), System Programming, Command-Line Interface, Performance Tuning, Data Security, Computer Hardware, Scalability
Google Cloud
Skills you'll gain: Data Loss Prevention, Email Security, Security Management, Google Workspace, Cloud Security, Threat Management, Data Security, Personally Identifiable Information, Malware Protection, Security Controls, Network Routing, Record Keeping
LearnQuest
Skills you'll gain: Continuous Monitoring, Cybersecurity, Security Management, Network Security, Security Strategy, Risk Management Framework, Internet Of Things, Cyber Risk, Threat Management, Cyber Security Strategy, Application Security, Infrastructure Security, Hardware Architecture, System Monitoring, Cloud Security, Security Engineering, Security Controls, Encryption, Wireless Networks, Network Protocols
University at Buffalo
Skills you'll gain: Process Mapping, Data Collection, Process Improvement, Business Process, Data Strategy, Data-Driven Decision-Making, Performance Measurement, Business Intelligence, Business Analytics, Operational Performance Management, Gap Analysis, Key Performance Indicators (KPIs), Data Quality, Internet Of Things
Johns Hopkins University
Skills you'll gain: Health Systems, Systems Engineering, Healthcare Industry Knowledge, Systems Integration, Systems Analysis, System Requirements, System Testing, Requirements Analysis, Solution Design
Skills you'll gain: Linux Commands, Linux, Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Command-Line Interface, Security Testing, Scripting, Vulnerability Assessments, Scripting Languages, Intrusion Detection and Prevention, Cyber Security Assessment, General Networking, Python Programming, Network Security, Cybersecurity, Application Security, Firewall, Web Applications, Cyber Operations
Searches related to cyber security assessment
In summary, here are 10 of our most popular cyber security assessment courses
- OWASP Top 10 - Welcome and Risks 1-5:Â Infosec
- European Business Law: Competing in Europe:Â Lund University
- Security and Privacy for Big Data - Part 2:Â EIT Digital
- Global Adolescent Health:Â The University of Melbourne
- Evidence-based Toxicology:Â Johns Hopkins University
- Supply Market Analysis:Â Rutgers the State University of New Jersey
- Intro to Operating Systems 4: Persistence:Â Codio
- Google Workspace Mail Management:Â Google Cloud
- Security at the Edge:Â LearnQuest
- Data-Driven Process Improvement:Â University at Buffalo