Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability assessment"
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Firewall, Threat Detection, Incident Response, Encryption
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Encryption, Application Security, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Vulnerability Management, Personally Identifiable Information, Web Applications, SQL
Banco Interamericano de Desarrollo
Skills you'll gain: Failure Analysis, Risk Analysis, Risk Modeling, Feasibility Studies, Risk Management, Project Risk Management, Risk Mitigation, Business Risk Management, Enterprise Risk Management (ERM), Analysis, Mitigation, Governance, Disaster Recovery, Financial Analysis, Cost Benefit Analysis, Environmental Resource Management, Civil Engineering, Data Analysis Software, Quantitative Research, Simulation and Simulation Software
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Security Information and Event Management (SIEM), Threat Management, Cyber Attacks
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Google Sheets, Business Analytics, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Strategy, Data Visualization Software, SQL
Skills you'll gain:
- Status: Free
University of Pennsylvania
Skills you'll gain: Vital Signs, Respiration, Health Assessment, Anatomy, Health Care, Patient Treatment
Johns Hopkins University
Skills you'll gain: Triage, Crisis Intervention, Rapport Building, Emergency Response, Trauma Care, First Aid, Interpersonal Communications, Community Mental Health Services, Mental Health, Stress Management, Patient Referral, Health Assessment
- Status: Free
Commonwealth Education Trust
Skills you'll gain: Constructive Feedback, Teaching, Student Engagement, Quality Assessment, Educational Materials, Instructional Strategies, Peer Review, Test Tools, Curriculum Development, Performance Reporting, Reliability
University of Michigan
Skills you'll gain: Product Lifecycle Management, Product Development, Product Design, Environment and Resource Management, Environment, Simulation and Simulation Software, Analysis, Industrial Engineering, Research Reports, Data Analysis Software, Data Collection
Skills you'll gain: Data-Driven Decision-Making, Health Assessment, Analysis, Health Care, Statistical Modeling, Clinical Research, Data Modeling, Health Care Administration, Medical Terminology, Risk Analysis
In summary, here are 10 of our most popular vulnerability assessment courses
- Cybersecurity Solutions and Microsoft Defender:Â Microsoft
- Identifying Security Vulnerabilities:Â University of California, Davis
- Natural Disaster and Climate Change Risk Assessment:Â Banco Interamericano de Desarrollo
- IBM Cybersecurity Analyst:Â IBM
- Security Analyst Fundamentals:Â IBM
- Foundations: Data, Data, Everywhere:Â Google
- Assets, Threats, and Vulnerabilities:Â Google
- Vital Signs: Understanding What the Body Is Telling Us:Â University of Pennsylvania
- Psychological First Aid:Â Johns Hopkins University
- Foundations of Teaching for Learning: Introduction to Student Assessment:Â Commonwealth Education Trust