Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber operations"
- Status: Free Trial
Skills you'll gain: Risk Management Framework, Cyber Risk, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cybersecurity, Security Management, Cyber Governance, Cyber Security Strategy, Risk Management, Security Controls, Infrastructure Security, Cyber Security Assessment, Vulnerability Assessments, Authorization (Computing), Security Requirements Analysis, Continuous Monitoring, Cyber Security Policies, Information Assurance, Information Systems Security
- Status: Free Trial
Skills you'll gain: Terraform, CI/CD, Infrastructure as Code (IaC), Continuous Integration, Ansible, Application Performance Management, Prometheus (Software), Continuous Deployment, Kubernetes, Application Deployment, System Monitoring, Package and Software Management, GitHub, Software Development Tools, Docker (Software), Version Control, Containerization, YAML, Infrastructure As A Service (IaaS), Automation
- Status: NewStatus: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Vulnerability Management, Security Information and Event Management (SIEM), Cyber Operations, Event Monitoring, Cyber Threat Hunting, Intrusion Detection and Prevention, Cyber Threat Intelligence, Enterprise Security, Threat Detection, Data Loss Prevention, Security Controls, Network Security, Network Monitoring
- Status: Preview
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
- Status: Preview
University of London
Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response
- Status: Free Trial
Microsoft
Skills you'll gain: Virtual Private Networks (VPN), Cybersecurity, Multi-Factor Authentication, Authentications, Information Systems Security, Desktop Support, Network Security, Technical Support and Services, Information Privacy, Servers, Cloud Computing, Encryption, Identity and Access Management, Mac OS
- Status: Free Trial
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
- Status: Free Trial
FAIR Institute
Skills you'll gain: Risk Analysis, Cyber Risk, Risk Appetite, Cyber Governance, Risk Modeling, Risk Management, Regulatory Compliance, Cybersecurity, Governance, Threat Management, Enterprise Risk Management (ERM), Continuous Monitoring, Cyber Security Strategy, Governance Risk Management and Compliance, Strategic Decision-Making, Insurance, Compliance Management, Threat Modeling, Business Risk Management, Business Communication
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Security Strategy, Cyber Governance, Risk Mitigation, Vendor Management, Vulnerability Assessments, Security Management, Cyber Risk, Compliance Management, Asset Management, Disaster Recovery, Supplier Management, Security Awareness, Cyber Security Strategy
- Status: Preview
Google Cloud
Skills you'll gain: Cyber Operations, Security Management, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Threat Management, Cyber Threat Hunting, DevOps, Cyber Threat Intelligence, Security Engineering, Threat Detection, Incident Response, Site Reliability Engineering, Digital Transformation, Agile Methodology, Automation, Critical Thinking
- Status: NewStatus: Preview
Skills you'll gain: MITRE ATT&CK Framework, Endpoint Security, Cyber Threat Hunting, Cyber Threat Intelligence, Endpoint Detection and Response, Cloud Security, Threat Detection, Cyber Operations, Threat Management, Microsoft Copilot, Malware Protection, Security Information and Event Management (SIEM), Microsoft Azure, Vulnerability Management, Cloud Computing, Incident Response, Computer Security Incident Management, Azure Active Directory, Hybrid Cloud Computing, Incident Management
- Status: Free Trial
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, Mobile Security, Enterprise Security, Computer Security, Threat Detection, Cyber Security Policies
In summary, here are 10 of our most popular cyber operations courses
- Cybersecurity Risk Management Framework: Infosec
- DevOps: Introduction to Developer Operations: Codio
- Into the Trenches: Security Operations Center : EC-Council
- In the Trenches: Security Operations Center : EC-Council
- Cyber Security Fundamentals: University of London
- Cybersecurity and Privacy: Microsoft
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- Cyber Risk Management for Executives: FAIR Institute
- Introduction to Cybersecurity & Risk Management: University of California, Irvine
- Modern Security Operations: Google Cloud