Filtrer par
ObjetObligatoire
LangueObligatoire
La langue utilisée tout au long du cours, tant dans l’enseignement que dans les évaluations.
Produit d'apprentissageObligatoire
NiveauObligatoire
DuréeObligatoire
Sous-titresObligatoire
ÉducateurObligatoire
Explorez le catalogue de cours de cybersécurité
- Statut : Essai gratuit
Compétences que vous acquerrez: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Cyber Attacks, Network Security, Cryptography, Intrusion Detection and Prevention, Threat Management, Information Systems Security, Threat Detection, Cyber Security Assessment, Cloud Security
- Statut : Essai gratuit
Compétences que vous acquerrez: Data Loss Prevention, Security Testing, Network Security, Cryptography, Security Controls, Cloud Security, Encryption, Data Security, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Computer Security Incident Management, Information Privacy
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: Penetration Testing, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Security Engineering, Cyber Threat Intelligence, Information Systems Security, Software Installation
Compétences que vous acquerrez: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)
- Statut : Essai gratuit
Infosec
Compétences que vous acquerrez: Protocoles réseau, Cybersécurité, TCP/IP, Sécurité réseau, Détection des menaces, Analyse du réseau, Détection des anomalies, Surveillance du réseau
- Statut : Essai gratuit
Compétences que vous acquerrez: Penetration Testing, Scripting, Scripting Languages, Cyber Security Assessment, Python Programming, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Command-Line Interface, Program Development, Network Protocols, Debugging, Software Installation
- Statut : Essai gratuit
Akamai Technologies, Inc.
Compétences que vous acquerrez: Analyse de la vulnérabilité, Infrastructure à clés publiques, Réponse aux incidents, Gestion de la sécurité, Gestion des risques, Cadre de gestion des risques, Gestion des incidents de sécurité informatique, Pare-feu, Test de pénétration, Sécurité réseau, Sécurité mobile, Cybersécurité, Détection des menaces, Gestion des identités et des accès, Durcissement, Sécurité des points finaux, Évaluations de la vulnérabilité, Authentifications, Reprise après sinistre, Cryptage
- Statut : Essai gratuit
Fundação Instituto de Administração
Compétences que vous acquerrez: Interoperability, DevOps, Information Systems Security, Cybersecurity, Systems Integration, Application Programming Interface (API), Application Security, IT Security Architecture, Data Security, Web Services, Information Technology, Software As A Service, Microservices, Cloud Services, Cloud Computing
- Statut : Essai gratuit
Compétences que vous acquerrez: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Threat Management, Security Management, Cybersecurity, Continuous Monitoring, Security Information and Event Management (SIEM), Scenario Testing, Technical Communication
- Statut : Essai gratuit
Compétences que vous acquerrez: Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Application Security, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Command-Line Interface, Microsoft Windows, Virtual Machines, SQL
- Statut : NouveauStatut : Essai gratuit
Compétences que vous acquerrez: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Authentications, Risk Analysis, Network Security, Risk Mitigation, Cyber Governance, Cloud Computing, Compliance Auditing, Application Security, Cyber Security Policies, Cyber Risk, Network Architecture, Computer Security, Governance, Data Security, Information Systems Security, Risk Management
- Statut : Essai gratuit
Google
Compétences que vous acquerrez: IT Security Architecture, Package and Software Management, IT Infrastructure, Computer Networking, Systems Administration, Microsoft Windows, OSI Models, Computer Security, Cybersecurity, Application Security, Cloud Management, Technical Support, Network Troubleshooting, Disaster Recovery, Operating Systems, Help Desk Support, TCP/IP, Computer Hardware, Linux, Software Installation
En résumé, voici 10 de nos cours les plus populaires sur cybersecurity .
- Certified Ethical Hacker (CEH) v.12: Packt
- Protection of Information Assets: Packt
- Exploitation and Penetration Testing with Metasploit: IBM
- Cyber Secure Coder (CSC-110) : Packt
- Python défensif: Infosec
- Advanced Exploitation and Scripting Techniques: Packt
- Introduction à la sécurité informatique: Akamai Technologies, Inc.
- Integração e Cibersegurança entre os Sistemas de Informação: Fundação Instituto de Administração
- Advanced Threat Hunting and Incident Response: LearnQuest
- Intermediate Ethical Hacking Techniques: Packt