Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity investment evaluation"
Skills you'll gain: Application Security, Hardware Architecture, Security Engineering, Security Controls, Internet Of Things, Encryption, Secure Coding, Vulnerability Assessments, Cloud Security, Threat Modeling, Data Security, Security Requirements Analysis, Vulnerability Management, General Data Protection Regulation (GDPR), Personally Identifiable Information, Cryptography, Information Privacy, Authentications, Authorization (Computing)
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Cybersecurity, Linux, Security Testing, Linux Commands, Authorization (Computing), Command-Line Interface, Microsoft Windows, Cryptography, Authentications, Unix Commands, Scripting, Virtual Machines, File Management
- Status: Free
Google Cloud
Skills you'll gain: Security Information and Event Management (SIEM), Cybersecurity, Cloud Security, Computer Security Incident Management, Google Cloud Platform, System Monitoring
- Status: Free
Coursera Project Network
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Real Time Data, Network Analysis
Politecnico di Milano
Skills you'll gain: Business Modeling, Corporate Sustainability, Environmental Social And Corporate Governance (ESG), Digital Transformation, Systems Thinking, Business Transformation, Business Strategies, Business Economics, Product Lifecycle Management, Environment and Resource Management, Finance, Policy Analysis, Emerging Technologies
Skills you'll gain: Identity and Access Management, Cryptography, Encryption, Risk Management Framework, Information Systems Security, Threat Management, Cybersecurity, Authentications, Data Security, Personally Identifiable Information, Security Controls, User Accounts, Information Privacy, Infrastructure Security, Multi-Factor Authentication, Authorization (Computing)
LearnQuest
Skills you'll gain: Linux Commands, Linux Administration, Linux, Cybersecurity, Serverless Computing, Cloud Computing Architecture, Cloud Computing, Information Systems Security, Open Source Technology, Information Technology, DevOps, Git (Version Control System)
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Mobile Security, Application Deployment, Endpoint Security, Threat Management, Apple iOS, System Configuration, Threat Detection, Cyber Security Policies, Application Security
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, MITRE ATT&CK Framework, Vulnerability Assessments, Infrastructure Security, Cybersecurity, Payment Card Industry (PCI) Data Security Standards, NIST 800-53, General Data Protection Regulation (GDPR), Network Analysis
Johns Hopkins University
Skills you'll gain: Research, Research Design, Consumer Behaviour, Influencing, Ethical Standards And Conduct, Behavioral Economics, Experimentation, Qualitative Research, Data Collection, Market Research, Marketing, Data Analysis, Statistical Analysis, Cultural Sensitivity
Eindhoven University of Technology
Skills you'll gain: Service Design, Transportation Operations, Feasibility Studies, Data Collection, Needs Assessment, Corporate Sustainability, Market Analysis, Research Methodologies, Environmental Issue, Trend Analysis, Consumer Behaviour
University of Michigan
Skills you'll gain: FinTech, Investments, Wealth Management, Financial Trading, Investment Management, Asset Management, Big Data, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Financial Services, Artificial Neural Networks, Machine Learning
In summary, here are 10 of our most popular cybersecurity investment evaluation courses
- Implementing Security in IoT and Edge Devices: LearnQuest
- The Complete Pentesting and Privilege Escalation Course: Packt
- Chronicle SIEM: Outcomes & Functions: Google Cloud
- Wireshark for Security: Detect Network Anomalies: Coursera Project Network
- Circular business models fostering sustainability: Politecnico di Milano
- Security Fundamentals and Identity Management: Packt
- LCFA Practice Course: LearnQuest
- Check Point Jump Start: Harmony Mobile: Check Point Software Technologies Ltd.
- Foundations and Reconnaissance Techniques: Packt
- Practical Neuromarketing Research: Johns Hopkins University