筛选依据
主题必需的
语言必需的
在整个课程(说明和评估)中使用的语言。
了解产品必需的
级别必需的
课程长度必需的
技能必需的
字幕必需的
教师必需的
找到最适合您目标的网络安全课程
- 状态:预览
Board Infinity
您将获得的技能: Vulnerability Assessments, Cyber Security Assessment, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Command-Line Interface, Linux Commands, Network Troubleshooting, Cybersecurity, Linux, Software Installation, Intrusion Detection and Prevention, Network Security, Network Analysis
- 状态:新状态:免费试用
您将获得的技能: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Vulnerability Assessments, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Network Troubleshooting, Anomaly Detection, Cyber Attacks, Computer Security, Network Analysis
Infosec
您将获得的技能: 网络威胁情报, 事件监测, 系统监控, 网络分析, 生成式人工智能, 威胁建模, 威胁管理, 威胁检测, 安全信息与事件管理(SIEM), Linux, 端点安全, 端点检测和响应, MITRE ATT&CK 框架, 网络威胁猎杀, 入侵检测和防御, 异常检测
- 状态:免费试用
University of California, Irvine
您将获得的技能: Data Governance, 法律, 安全控制, 安全战略, 监管合规, 程序开发, 网络风险, 计划标准, 管理, 风险管理, 合规管理, 网络安全, 网络安全战略, 计算机安全, 安全管理, 网络治理, 网络安全政策, NIST 800-53
- 状态:预览
Illinois Tech
您将获得的技能: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
- 状态:免费试用
您将获得的技能: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
- 状态:新状态:免费试用
Macquarie University
您将获得的技能: Threat Modeling, Incident Response, Cyber Governance, Cyber Security Strategy, Threat Management, Cyber Risk, Cybersecurity, Cyber Attacks, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Threat Detection, Leadership, Compliance Management, Leadership and Management, Governance, Risk Management, ISO/IEC 27001, NIST 800-53, Resilience
- 状态:免费试用
您将获得的技能: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
- 状态:新
您将获得的技能: Cybersecurity, ChatGPT, Infrastructure Security, Security Information and Event Management (SIEM), General Networking, Threat Detection, Incident Response, Cloud Security, System Configuration, Automation
- 状态:免费试用
您将获得的技能: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Exploit development, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Secure Coding, Threat Modeling, Web Applications, Cloud Security, Internet Of Things
- 状态:免费试用
您将获得的技能: Threat Management, Cybersecurity, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
- 状态:免费试用
University of Colorado System
您将获得的技能: 算术, 计算机科学, 应用数学, 公钥加密标准(PKCS), 公钥基础设施, 概率, Authentication, 高级加密标准(AES), Algorithm, 密码学, 数据加密标准, Encryption, 关键管理, 网络安全, 数据完整性
总之,以下是 10 最受欢迎的 cybersecurity 课程
- Kali Linux: Board Infinity
- IBM Ethical Hacking with Open Source Tools: IBM
- 网络威胁猎杀: Infosec
- 安全治理与合规: University of California, Irvine
- Cyber Security Technologies: Illinois Tech
- Security Foundations, Threats, and Network Protection: Packt
- Cyber Security: GRC Part 2 - Risk Management and Compliance: Macquarie University
- Assets, Threats, and Vulnerabilities: Google
- Cyber Security Projects for Your Dream Job: Packt
- Advanced Network Attacks, Web Hacking, and Cryptography: Packt