Filtrer par
ObjetObligatoire
LangueObligatoire
La langue utilisée tout au long du cours, tant dans l’enseignement que dans les évaluations.
Produit d'apprentissageObligatoire
NiveauObligatoire
DuréeObligatoire
Sous-titresObligatoire
ÉducateurObligatoire
Explorez le catalogue de cours de cybersécurité
- Statut : Essai gratuit
Compétences que vous acquerrez: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Threat Detection, Threat Management, Cyber Attacks, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols
- Statut : Essai gratuit
Google Cloud
Compétences que vous acquerrez: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Security, Cloud Computing, Cybersecurity, Infrastructure Security, Authentications, Authorization (Computing), Public Cloud, Network Security, Data Storage, Identity and Access Management, Data Centers, Encryption
- Statut : Essai gratuit
Compétences que vous acquerrez: Email Security, Microsoft Outlook, Calendar Management, Gmail, Setting Appointments, Meeting Facilitation, Organizational Skills, Google Workspace, Scheduling, Administrative Support and Clerical Tasks, Productivity Software, Collaborative Software, Cybersecurity
- Statut : Essai gratuit
Compétences que vous acquerrez: Linux Commands, Linux, Command-Line Interface, Penetration Testing, General Networking, Network Security, Cybersecurity, Vulnerability Assessments, Wireless Networks, System Configuration, Software Installation, Virtual Machines
- Statut : Essai gratuit
Compétences que vous acquerrez: Systèmes d'Exploitation, Linux, Commandes Linux, Microsoft Windows, Windows PowerShell, Test de pénétration, Interface de ligne de commande, Cybersécurité, Systèmes informatiques, Mac OS, Évaluation de la cybersécurité, Évaluations de la vulnérabilité
- Statut : Nouveau
Compétences que vous acquerrez: MITRE ATT&CK Framework, Cyber Threat Intelligence, Cyber Security Strategy, Cybersecurity, Threat Modeling, Computer Security, Cyber Attacks, Threat Detection, Artificial Intelligence, Anomaly Detection, Data Ethics, Information Privacy, Innovation
- Statut : Prévisualisation
Illinois Tech
Compétences que vous acquerrez: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
- Statut : Essai gratuit
Compétences que vous acquerrez: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Web Applications, Security Controls, Cloud Security, Internet Of Things, SQL
- Statut : Essai gratuit
Compétences que vous acquerrez: Hardware Troubleshooting, Customer Service, Network Troubleshooting, Customer Relationship Building, Computer Security Incident Management, Desktop Support, Incident Response, Professional Development, Continuous Improvement Process, Cybersecurity, Process Improvement, Performance Metric, Software Architecture, Technical Support, Computer Hardware, Cyber Attacks, Customer experience improvement, Customer Complaint Resolution, Digital Transformation, Lifelong Learning
- Statut : Essai gratuit
Fundação Instituto de Administração
Compétences que vous acquerrez: Digital Transformation, IT Service Management, Information Technology Infrastructure Library, Service Management, Interoperability, IT Management, Business Transformation, Data Strategy, DevOps, Information Systems Security, Cybersecurity, Systems Integration, Innovation, Application Programming Interface (API), Service Design, Organizational Strategy, Mobile Banking, Social Media, E-Commerce, Organizational Development
- Statut : Prévisualisation
Johns Hopkins University
Compétences que vous acquerrez: Mathématiques appliquées, Calculs, Modélisation mathématique, Programmation en Python, Analyse numérique, Calcul intégral, Graphique, Principes de programmation, Logiciels mathématiques, Produits dérivés, Mathématiques avancées
- Statut : Essai gratuit
Compétences que vous acquerrez: Continuous Monitoring, Business Continuity, Security Management, ISO/IEC 27001, Security Controls, Threat Management, Risk Management, Risk Analysis, Security Strategy, Business Risk Management, Cyber Risk, Regulation and Legal Compliance, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Risk Mitigation
En résumé, voici 10 de nos cours les plus populaires sur cybersecurity .
- System Hacking, Malware Threats, and Network Attacks: Packt
- Trust and Security with Google Cloud: Google Cloud
- Get Started with Mail and Calendar Applications: Outlook: SkillUp
- Ethical Hacking Foundations: Packt
- Fondements des systèmes d'exploitation: Infosec
- Generative AI and its Impact on Cybersecurity: Packt
- Cyber Security Technologies: Illinois Tech
- Advanced Network Attacks, Web Hacking, and Cryptography: Packt
- Dell Technologies Technical Customer Support Specialist: Dell
- Introdução aos Sistemas de Informação para Negócios: Fundação Instituto de Administração