Filtrer par
ObjetObligatoire
LangueObligatoire
La langue utilisée tout au long du cours, tant dans l’enseignement que dans les évaluations.
Produit d'apprentissageObligatoire
NiveauObligatoire
DuréeObligatoire
Sous-titresObligatoire
ÉducateurObligatoire
Explorez le catalogue de cours de cybersécurité
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Threat Detection, Vulnerability Scanning, Vulnerability Assessments, Incident Response, Cyber Security Assessment, Cyber Threat Intelligence, Vulnerability Management, Computer Security Incident Management, Threat Management, Incident Management, Cybersecurity, Risk Mitigation, Security Strategy, Software Installation, System Configuration, Technical Writing, Emergency Response, Network Analysis
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Vulnerability Assessments, Malware Protection, Cloud Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Threat Modeling, Cryptography, Cyber Threat Intelligence, Computer Security Awareness Training, Mobile Security, Cyber Attacks, Continuous Monitoring, Penetration Testing, Cloud Computing, Web Applications, Internet Of Things, Network Architecture
- Statut : NouveauStatut : Essai gratuit
EC-Council
Compétences que vous acquerrez: Réponse aux incidents, Analyse des risques, Cryptographie, Sécurité de l'informatique en nuage, Gestion des informations et des événements de sécurité (SIEM), Cybersécurité, Sécurité réseau, Internet des objets, Évaluations de la vulnérabilité, Gestion des vulnérabilités, Détection des menaces, Surveillance du réseau, Sécurité mobile, Applications Web, Politiques de cybersécurité, Protection contre les logiciels malveillants, Test de pénétration, Cycle de vie du développement des systèmes, Sécurité des applications, Gestion des identités et des accès
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Penetration Testing, Vulnerability Assessments, Vulnerability, Cybersecurity, Software Installation, Information Systems Security, Virtual Machines
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Incident Response, Computer Security Incident Management, Business Continuity Planning, Security Management, Disaster Recovery, Cybersecurity, Data Integrity
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Intellectual Property, Risk Management, Information Systems Security, Governance, Information Assurance, Cybersecurity, Business Risk Management, Information Privacy, ISO/IEC 27001, Security Controls, Threat Management, Personally Identifiable Information, Asset Protection, Vulnerability Assessments, Law, Regulation, and Compliance, Vendor Management, Information Systems
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Cybersecurity, Cyber Threat Intelligence, Computer Security Awareness Training, Cyber Attacks, Cyber Operations, Information Systems Security Assessment Framework (ISSAF), Cyber Security Assessment, Penetration Testing, Threat Modeling, Security Testing, Data Security, Vulnerability Assessments
- Statut : Essai gratuit
New York University
Compétences que vous acquerrez: Infrastructure à clés publiques, Cryptographie, Cybersécurité, Gestion des clés, Sécurité réseau, Cryptage, Assurance de l'information, Sécurité informatique, Contrôles de sécurité, Authentifications
- Statut : Nouveau
Compétences que vous acquerrez: Non-Verbal Communication, Penetration Testing, Human Factors (Security), Threat Modeling, Cyber Threat Intelligence, Social Sciences, Interpersonal Communications, Cybersecurity, Security Awareness, Persuasive Communication, Cyber Attacks, Vulnerability, Email Security, Data Collection
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Computer Security Incident Management, Threat Modeling, Security Management, Risk Management, Business Continuity, Governance, Disaster Recovery, Contingency Planning, Governance Risk Management and Compliance, Continuous Monitoring, Program Management, Security Controls, Ethical Standards And Conduct, Enterprise Security, Cybersecurity, Cloud Computing, IT Management, Information Assurance, Test Planning, Malware Protection
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Governance, Governance Risk Management and Compliance, Ethical Standards And Conduct, Regulatory Compliance, Enterprise Security, Business Metrics, Process Development, Key Performance Indicators (KPIs)
- Statut : NouveauStatut : Gratuit
Compétences que vous acquerrez: Prompt Engineering, ChatGPT, Penetration Testing, Cyber Threat Intelligence, Cyber Operations, Data Ethics, Cyber Security Assessment, Application Security, Vulnerability Scanning, Vulnerability Assessments, Generative AI, Application Programming Interface (API), Artificial Intelligence
En résumé, voici 10 de nos cours les plus populaires sur cybersecurity .
- Incident Response and Defense with OpenVAS: IBM
- Certified Ethical Hacker (CEH): Pearson
- Sécurité de l'information: EC-Council
- Exploitation and Penetration Testing with Metasploit: IBM
- (SSCP) Systems Security Certified Practitioner: Unit 7: Pearson
- CISSP Domain 1: Security and Risk Management: Infosec
- Certified Ethical Hacker (CEH): Unit 1: Pearson
- Contre-mesures en cas de cyberattaque: New York University
- Social Engineering Expert: Packt
- The Pearson Complete Course for CISM Certification: Pearson