Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber operations"
University of Pennsylvania
Skills you'll gain: Business Analytics, Descriptive Analytics, Predictive Analytics, Analytics, Demand Planning, Data-Driven Decision-Making, Operational Analysis, Business Operations, Risk Analysis, Forecasting, Operations Management, Risk Management, Business Modeling, Simulation and Simulation Software, Process Optimization, Decision Making, Decision Tree Learning, Microsoft Excel, Probability Distribution
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
- Status: Free
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security Awareness Training, Threat Detection, General Networking, Vulnerability
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
University of Pennsylvania
Skills you'll gain: Operations Management, Operational Efficiency, Process Analysis, Operational Performance Management, Process Improvement, Lean Methodologies, Workflow Management, Continuous Improvement Process, Capacity Planning, Quality Management, Business Workflow Analysis, Supply Chain Management, Inventory Management System, Statistical Process Controls, Process Flow Diagrams, Root Cause Analysis
Skills you'll gain: Cybersecurity, Encryption, Cyber Attacks, Email Security, Computer Security Awareness Training, Security Awareness, Data Security, Information Systems Security, Malware Protection, Authentications, Authorization (Computing), Security Controls, Hardening, Identity and Access Management, Multi-Factor Authentication, Browser Compatibility
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
- Status: [object Object]
Skills you'll gain: Quality Management, Project Scoping, Project Closure, Project Management, Project Management Life Cycle, Project Planning, Continuous Improvement Process, Agile Project Management, Project Controls, Quality Monitoring, Backlogs, Team Management, Project Documentation, Agile Methodology, Communication Planning, Project Risk Management, Project Schedules, Change Management, Milestones (Project Management), Organizational Structure
- Status: Free
The University of Sydney
Skills you'll gain: Calculus, Integral Calculus, Algebra, Advanced Mathematics, Geometry, Trigonometry, Arithmetic, Derivatives, Mathematical Modeling, Graphing
- Status: Free
National Taiwan University
Skills you'll gain: Operations Research, Mathematical Modeling, Process Optimization, Applied Mathematics, Business Modeling, Industrial Engineering, Operations Management, Inventory Control, Resource Allocation, Business Analytics, Production Planning, Microsoft Excel, Scheduling, Linear Algebra, Decision Making, Portfolio Management, Complex Problem Solving
In summary, here are 10 of our most popular cyber operations courses
- Operations Analytics:Â University of Pennsylvania
- Google Cybersecurity:Â Google
- Cybersecurity for Everyone:Â University of Maryland, College Park
- International Cyber Conflicts:Â The State University of New York
- Introduction to Cyber Security:Â New York University
- IT Fundamentals for Cybersecurity:Â IBM
- Introduction to Operations Management:Â University of Pennsylvania
- Introduction to Cybersecurity Essentials:Â IBM
- IBM Cybersecurity Analyst:Â IBM
- Google Project Management::Â Google