• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Cyber Sicherheitsrichtlinien

Results for "cyber-sicherheitsrichtlinien"


  • I

    Infosec

    Cyber Threat Hunting

    Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Detection, Threat Management, Threat Modeling, MITRE ATT&CK Framework, Endpoint Detection and Response, Intrusion Detection and Prevention, Security Information and Event Management (SIEM), Anomaly Detection, Generative AI, Endpoint Security, Event Monitoring, System Monitoring, Network Analysis, Linux

    4.5
    Rating, 4.5 out of 5 stars
    ·
    134 reviews

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    CyberPatriot

    Skills you'll gain: Ubuntu, Cybersecurity, Cyber Attacks, Microsoft Windows, Computer Security, Computer Security Awareness Training, Information Systems Security, Linux, Cyber Security Policies, Network Security, Virtualization, Linux Commands, Linux Administration, Data Ethics, Data Security, Virtualization and Virtual Machines, Hardening, Command-Line Interface, Operating System Administration, Virtual Machines

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    F

    FAIR Institute

    Understanding Cyber Risk Reporting with FAIRâ„¢

    Skills you'll gain: Incident Response, Cyber Risk, Cyber Governance, Cyber Security Strategy, Legal Risk, Enterprise Risk Management (ERM), Business Risk Management, Operational Risk, Mergers & Acquisitions, Cybersecurity, Risk Analysis, Risk Management, Safety Culture, Compliance Reporting, Regulatory Requirements

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Application of AI

    Skills you'll gain: Anomaly Detection, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Intrusion Detection and Prevention, Fraud detection, Cybersecurity, Applied Machine Learning, Malware Protection, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Machine Learning Methods, Network Analysis, Machine Learning, Machine Learning Algorithms, Artificial Neural Networks, MLOps (Machine Learning Operations), Data-Driven Decision-Making

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Homeland Security and Cybersecurity Future

    Skills you'll gain: Cybersecurity, Cyber Security Strategy, Infrastructure Security, Cyber Attacks, Cyber Operations, Cyber Risk, Cyber Security Policies, Cyber Governance, Incident Response, Risk Management Framework, Technology Solutions, Legal Risk

    4.7
    Rating, 4.7 out of 5 stars
    ·
    161 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    I

    IBM

    Introduction to the Threat Intelligence Lifecycle

    Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Management, Data Validation, Technical Communication, Automation, Requirements Analysis, Machine Learning

    4.7
    Rating, 4.7 out of 5 stars
    ·
    34 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    R

    Royal Holloway, University of London

    Security Management and Governance

    Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, Cybersecurity, ISO/IEC 27001, Cyber Risk, Security Strategy, Risk Management Framework, Human Factors

    4.8
    Rating, 4.8 out of 5 stars
    ·
    37 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH): Unit 4

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security), Network Analysis

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: DevSecOps

    Skills you'll gain: DevSecOps, Secure Coding, Cloud-Native Computing, Software Architecture, Security Engineering, Software Design, Microsoft Azure, Cybersecurity, DevOps, Kubernetes, Infrastructure as Code (IaC), Web Applications, Azure DevOps, Containerization, API Design, Docker (Software), Software Engineering, Role-Based Access Control (RBAC), Dependency Analysis, Git (Version Control System)

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 2

    Skills you'll gain: Application Security, Cyber Security Strategy, Patch Management, Security Strategy

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Digital Forensics

    Skills you'll gain: Criminal Investigation and Forensics, Investigation, File Systems, Mobile Security, Cybersecurity, Data Security, Threat Detection, Data Integrity, Graphical Tools, Digital Communications, Malware Protection, File Management, Computer Security Incident Management, Incident Response, Mobile Development Tools, Data Storage, Real Time Data, Disaster Recovery, Network Analysis, Regulation and Legal Compliance

    4.4
    Rating, 4.4 out of 5 stars
    ·
    11 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Cybersecurity Incident Response and Communication

    Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Detection, Vulnerability Assessments, Cyber Threat Hunting, Event Monitoring, Technical Communication, Cyber Security Policies, Vulnerability Management, Continuous Monitoring, Threat Management, Security Controls, Communication Strategies, Root Cause Analysis

    4.5
    Rating, 4.5 out of 5 stars
    ·
    6 reviews

    Intermediate · Course · 1 - 4 Weeks

1…8910…47

In summary, here are 10 of our most popular cyber-sicherheitsrichtlinien courses

  • Cyber Threat Hunting: Infosec
  • CyberPatriot: Packt
  • Understanding Cyber Risk Reporting with FAIRâ„¢: FAIR Institute
  • Cyber Security: Application of AI: Macquarie University
  • Homeland Security and Cybersecurity Future: University of Colorado System
  • Introduction to the Threat Intelligence Lifecycle : IBM
  • Security Management and Governance: Royal Holloway, University of London
  • Certified Ethical Hacker (CEH): Unit 4: Pearson
  • Cyber Security: DevSecOps: Macquarie University
  • CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 2: Pearson

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok