Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability assessments"
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cryptography, Cyber Security Assessment, Cyber Risk, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Security Policies, Infrastructure Security, Security Awareness, Identity and Access Management
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Application Security, Vulnerability Assessments, Vulnerability Management, Event Monitoring, Security Controls, Data Integrity, Patch Management, Network Security
University at Buffalo
Skills you'll gain: Model Based Systems Engineering, Systems Engineering, Product Lifecycle Management, Intrusion Detection and Prevention, Security Controls, Performance Measurement, Anomaly Detection, Machine Controls, Incident Response, Digital Transformation, Vulnerability Assessments, Software Development Life Cycle, Product Engineering, Cybersecurity, Supply Chain Management, Manufacturing Processes, Supply Chain Planning, Data Sharing, Manufacturing Operations, Constructive Feedback
University of Colorado Boulder
Skills you'll gain: Crisis Management, Systems Thinking, Leadership, Strategic Communication, Threat Management, Change Management, Threat Detection, Organizational Leadership, Infrastructure Security, Business Continuity, Disaster Recovery, Organizational Change, Engineering Management, Emergency Response, Contingency Planning, Business Ethics, Communication, Risk Analysis, Complex Problem Solving, Decision Making
Macquarie University
Skills you'll gain: Overcoming Objections, Influencing, Persuasive Communication, Storytelling, Rapport Building, Meeting Facilitation, Leadership, Presentations, Communication, Stakeholder Communications, Verbal Communication Skills, Public Speaking, Target Audience, Non-Verbal Communication, Decision Making
Skills you'll gain: Endpoint Security, Vulnerability Management, Infrastructure as Code (IaC), Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Vulnerability Scanning, Network Architecture, Cloud Computing, Threat Management, Zero Trust Network Access, Cybersecurity, Cyber Attacks, Network Security, Cyber Security Assessment, IT Security Architecture, Threat Detection, Mobile Security, Hardening
University of Colorado System
Skills you'll gain: Infrastructure Security, Cyber Risk, Cyber Security Policies, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Risk Management Framework, Technology Roadmaps, Network Infrastructure, Transportation Operations, Infrastructure Architecture
Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, Threat Management, System Testing, Threat Detection, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface
University of Michigan
Skills you'll gain: Social Justice, Environmental Issue, Environmental Policy, Environment Health And Safety, Risk Management, Mitigation, Risk Analysis, Pollution Prevention, Health Assessment, Community Development, Vulnerability
Banco Interamericano de Desarrollo
Skills you'll gain: Feasibility Studies, Risk Management, Risk Analysis, Risk Mitigation, Business Risk Management, Governance, Financial Analysis, Cost Benefit Analysis, Prioritization, Investments, Decision Making, Project Management, Public Policies
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Risk Mitigation, Risk Modeling, Vulnerability Assessments, Security Controls
In summary, here are 10 of our most popular vulnerability assessments courses
- Cybersecurity and Its Ten Domains:Â Kennesaw State University
- Identifying Security Vulnerabilities in C/C++Programming:Â University of California, Davis
- OWASP Top 10 - Risks 6-10:Â Infosec
- Digital Manufacturing & Design Technology:Â University at Buffalo
- Resilience Engineering and Leadership in Crisis:Â University of Colorado Boulder
- Storytelling and influencing: Communicate with impact:Â Macquarie University
- Cloud Security, Resiliency, and Vulnerability Management:Â Packt
- Cybersecurity Policy for Aviation and Internet Infrastructures:Â University of Colorado System
- Cybersecurity Testing and Prevention:Â Microsoft
- Human Health Risks, Health Equity, and Environmental Justice:Â University of Michigan