Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber operations"
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Data Security, Cloud Applications, Cloud Services, Application Security, Authorization (Computing), Cyber Risk, Secure Coding, Cloud Storage, Personally Identifiable Information, DevSecOps, General Data Protection Regulation (GDPR), Network Security, Cloud Computing, Cybersecurity, Threat Management, Security Controls
Johns Hopkins University
Skills you'll gain: Medical Privacy, Electronic Medical Record, Telehealth, Patient Safety, Health Technology, Health Information Management, Medical Equipment and Technology, Security Awareness, Cloud Security, Personally Identifiable Information, Encryption, Help Desk Support, Desktop Support, End User Training and Support, Health Care, Technical Support and Services, Decision Support Systems, Health Care Procedure and Regulation, Clinical Data Management, Patient Education and Support
LearnQuest
Skills you'll gain: Package and Software Management, Linux Administration, Linux, Linux Commands, Linux Servers, Virtual Private Networks (VPN), System Monitoring, Public Key Infrastructure, File Management, Command-Line Interface, Intrusion Detection and Prevention, Git (Version Control System), File Systems, User Accounts, Firewall, Remote Access Systems, Cloud Computing Architecture, Unix Commands, DevOps, Virtualization
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Continuous Monitoring, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Cyber Security Strategy, Information Systems Security Assessment Framework (ISSAF), Cyber Security Assessment, Network Security, Risk Management Framework, Cloud Security, Authentications
University of Colorado Boulder
Skills you'll gain: Theoretical Computer Science, Algorithms, Data Structures, Graph Theory, Operations Research, Public Key Cryptography Standards (PKCS), Computational Thinking, Computer Programming, Computational Logic, Cryptography, Computer Science, Programming Principles, Applied Mathematics, Advanced Mathematics, Mathematical Theory & Analysis, Encryption, Network Model, Linear Algebra, Combinatorics, Tree Maps
Johns Hopkins University
Skills you'll gain: Clinical Data Management, Clinical Trials, Sample Size Determination, Clinical Research, Data Quality, Healthcare Ethics, Quality Assurance, Data Cleansing, Regulatory Compliance, Data Integrity, Data Governance, Microsoft Excel, Statistical Reporting, Data Compilation, Data Collection, Scientific Methods, Biostatistics, Data Sharing, Statistical Analysis, Patient Safety
IIMA - IIM Ahmedabad
Skills you'll gain: Sampling (Statistics), Probability, Statistical Hypothesis Testing, Statistics, Data Literacy, Probability Distribution, Statistical Methods, Statistical Inference, Estimation, Descriptive Statistics, Data Analysis
University of London
Skills you'll gain: Computer Science, Debugging, Development Environment, Computer Systems, Web Applications, Graphing, Javascript, Computer Networking, Computational Thinking, Program Development, Arithmetic, Computer Graphics, Operating Systems, Computer Hardware, Applied Mathematics, Mathematical Modeling, Cybersecurity, Computer Programming, Problem Management, General Mathematics
Michigan State University
Skills you'll gain: Financial Statements, Intellectual Property, Value Propositions, Financial Statement Analysis, Business Planning, Design Thinking, Ideation, Innovation, Income Statement, Entrepreneurship, Customer Acquisition Management, Business Modeling, Product Development, Balance Sheet, Market Opportunities, New Product Development, Creative Thinking, Resource Allocation, Lean Methodologies, Open Mindset
Palo Alto Networks
Skills you'll gain: Endpoint Security, Security Information and Event Management (SIEM), Zero Trust Network Access, Cybersecurity, Cyber Threat Intelligence, Threat Modeling, Security Engineering, Continuous Monitoring, IT Security Architecture, Threat Detection, Incident Response, Malware Protection, Automation, Data Lakes
Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Email Security, Threat Detection, Threat Modeling, Jupyter, Authentications, Intrusion Detection and Prevention, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Artificial Intelligence and Machine Learning (AI/ML), Computer Vision, Natural Language Processing, Machine Learning, Deep Learning
University of Illinois Urbana-Champaign
Skills you'll gain: Financial Statements, Financial Statement Analysis, Financial Analysis, Finance, Cash Flows, Balance Sheet, Income Statement, Accounting, Investment Management, Return On Investment, Corporate Finance, Financial Management, Organizational Structure, Business, Business Management, Financial Forecasting
In summary, here are 10 of our most popular cyber operations courses
- Cybersecurity in the Cloud:Â University of Minnesota
- Healthcare IT Support:Â Johns Hopkins University
- Learning Linux for LFCA Certification:Â LearnQuest
- Cyber Security in Manufacturing :Â University at Buffalo
- Foundations of Data Structures and Algorithms:Â University of Colorado Boulder
- Clinical Trials Operations:Â Johns Hopkins University
- Pre-MBA Statistics:Â IIMA - IIM Ahmedabad
- Introduction to Computer Science and Programming:Â University of London
- How to Start Your Own Business:Â Michigan State University
- Palo Alto Networks Security Operations Fundamentals:Â Palo Alto Networks