Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber operations"
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
University of Pennsylvania
Skills you'll gain: Return On Investment, Financial Reporting, Finance, Financial Data, Capital Budgeting, Financial Statements, Financial Modeling, Mathematical Modeling, Statistical Modeling, Regression Analysis, Business Modeling, Income Statement, Financial Analysis, Risk Analysis, Cash Flows, Business Mathematics, Financial Planning, Spreadsheet Software, Google Sheets, Excel Formulas
University of California San Diego
Skills you'll gain: Data Structures, Graph Theory, Algorithms, Network Routing, Debugging, Network Model, Bioinformatics, Advanced Mathematics, Operations Research, Data Storage, Development Testing, Software Testing, Theoretical Computer Science, Computational Thinking, Network Analysis, Programming Principles, Computer Programming, Epidemiology, C++ (Programming Language), Infectious Diseases
University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, ISO/IEC 27001, Risk Management Framework, Information Assurance, Security Controls, Incident Response
Skills you'll gain: Package and Software Management, Desktop Support, Linux, Microsoft Windows, File Systems, Remote Access Systems, Operating Systems, Linux Administration, OS Process Management, System Support, Systems Administration, Software Installation, User Accounts, System Configuration, Linux Commands, Command-Line Interface, System Monitoring, User Provisioning, Authorization (Computing), Identity and Access Management
University of Pennsylvania
Skills you'll gain: Operations Management, Operational Efficiency, Process Analysis, Operational Performance Management, Process Improvement, Lean Methodologies, Workflow Management, Continuous Improvement Process, Capacity Planning, Quality Management, Business Workflow Analysis, Supply Chain Management, Inventory Management System, Statistical Process Controls, Process Flow Diagrams, Root Cause Analysis
Microsoft
Skills you'll gain: Virtual Private Networks (VPN), Cybersecurity, Multi-Factor Authentication, Authentications, Information Systems Security, Network Security, Technical Support and Services, Information Privacy, Servers, Cloud Computing, Cloud Security, Network Administration, Encryption, Identity and Access Management, Mac OS
Rutgers the State University of New Jersey
Skills you'll gain: Lean Six Sigma, Lean Manufacturing, Manufacturing Operations, Process Improvement, Operations Management, Six Sigma Methodology, Operational Efficiency, Quality Improvement, Kanban Principles, Inventory Management System
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Data Integrity
Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Cyber Threat Hunting, Penetration Testing, Anomaly Detection, Scripting, Command-Line Interface, Python Programming, Data Access, System Monitoring, User Accounts, Scripting Languages, System Programming, Automation
Skills you'll gain: Security Controls, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Security Policies, Network Analysis, Security Information and Event Management (SIEM), Ethical Standards And Conduct, SQL
In summary, here are 10 of our most popular cyber operations courses
- Connect and Protect: Networks and Network Security:Â Google
- Finance & Quantitative Modeling for Analysts:Â University of Pennsylvania
- Data Structures and Algorithms:Â University of California San Diego
- Cyber Security Fundamentals:Â University of London
- Operating Systems and You: Becoming a Power User:Â Google
- Introduction to Operations Management:Â University of Pennsylvania
- Cybersecurity and Privacy:Â Microsoft
- Supply Chain Operations:Â Rutgers the State University of New Jersey
- Cyber Incident Response:Â Infosec
- Introduction to Cyber Attacks:Â New York University