Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber operations"
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Skills you'll gain: Artificial Intelligence and Machine Learning (AI/ML), Generative AI, MLOps (Machine Learning Operations), Artificial Intelligence, Cloud Computing, Cloud Infrastructure, IT Infrastructure, Deep Learning, Tensorflow, Hardware Architecture, Machine Learning, PyTorch (Machine Learning Library), Data Centers
- Status: Free
National Taiwan University
Skills you'll gain: Operations Research, Mathematical Modeling, Process Optimization, Applied Mathematics, Business Modeling, Industrial Engineering, Operations Management, Inventory Control, Resource Allocation, Business Analytics, Production Planning, Microsoft Excel, Scheduling, Linear Algebra, Decision Making, Portfolio Management, Complex Problem Solving
Skills you'll gain: Computer Hardware, Technical Support, Software Installation, Technical Documentation, Hardware Troubleshooting, Computer Networking, Information Technology, Technical Communication, TCP/IP, Software Systems, Linux, Microsoft Windows
- Status: New
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Crisis Management, Incident Response, OpenAI, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Threat Management, Expense Management, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Creative Thinking, Creativity
Skills you'll gain: Data Pipelines, Dataflow, Google Cloud Platform, Real Time Data, Data Lakes, Data Storage, MLOps (Machine Learning Operations), Data Analysis, Dashboard, Data Warehousing, Data Processing, Extract, Transform, Load, Data Infrastructure, Cloud Storage, Big Data, Tensorflow, Unstructured Data, Data Management, Data Integration, Data Visualization Software
Skills you'll gain: Network Security, Hardening, Network Protocols, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)
Google
Skills you'll gain: Scripting, Python Programming, Computer Programming, Algorithms, Problem Management, Data Structures, Debugging, Development Environment
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Regulatory Compliance, General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Regulation and Legal Compliance, Communication Planning, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Business Ethics, Governance, Internal Controls
Illinois Tech
Skills you'll gain: Process Improvement, Process Management, Business Process, Process Analysis, Business Process Improvement, Performance Improvement, Quality Improvement, Process Mapping, Operations Management, Quality Management, Return On Investment, Change Management, Risk Management, Business Technologies, Project Management, Key Performance Indicators (KPIs), Emerging Technologies
Skills you'll gain: Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Cyber Risk, Cyber Governance, NIST 800-53, Regulatory Compliance, Auditing, Cybersecurity, Cyber Security Policies, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Security Controls, Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR), Business Ethics
In summary, here are 10 of our most popular cyber operations courses
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- AI Infrastructure and Operations Fundamentals:Â NVIDIA
- Operations Research (1): Models and Applications:Â National Taiwan University
- Technical Support Fundamentals:Â Google
- Generative AI Cybersecurity & Privacy for Leaders:Â Vanderbilt University
- Preparing for Google Cloud Certification: Cloud Data Engineer:Â Google Cloud
- Connect and Protect: Networks and Network Security:Â Google
- Crash Course on Python:Â Google
- Regulatory Compliance:Â University of Pennsylvania
- Operations and Process Management:Â Illinois Tech