Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability analysis"
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, NIST 800-53, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Data Integrity
Johns Hopkins University
Skills you'll gain: Statistical Analysis, R Programming, Statistical Programming, Data Analysis, Debugging, Simulations, Program Development, Software Installation, Computer Programming, Data Structures, Performance Tuning, Data Import/Export
Duke University
Skills you'll gain: Statistical Hypothesis Testing, Sampling (Statistics), Statistical Inference, Exploratory Data Analysis, Regression Analysis, Statistical Reporting, Probability Distribution, Statistical Methods, Statistical Software, R Programming, Bayesian Statistics, Statistical Analysis, Data Analysis, Statistical Modeling, Probability & Statistics, Probability, Statistics, Data Science, Descriptive Statistics, Predictive Modeling
University of California, Davis
Skills you'll gain: Data Governance, Presentations, Feature Engineering, A/B Testing, Data Cleansing, SQL, Apache Spark, Distributed Computing, Descriptive Statistics, Data Lakes, Data Storytelling, Peer Review, Exploratory Data Analysis, Data Quality, Data Pipelines, Databricks, JSON, Statistical Analysis, Query Languages, Data Manipulation
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Security Management, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Cyber Attacks, Malware Protection, Email Security, Vulnerability Management, Artificial Intelligence
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Cyber Threat Hunting, Intrusion Detection and Prevention, Threat Management, Incident Response, Event Monitoring, Computer Security Incident Management, Network Analysis, Cybersecurity, Anomaly Detection, Network Security, Network Monitoring, Network Protocols, SQL
Skills you'll gain: Malware Protection, Cyber Threat Hunting, Application Security, Cybersecurity, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Windows PowerShell, Virtualization, Operating Systems, Programming Principles, Computer Architecture, Linux
- Status: Free
Yale University
Skills you'll gain: Investment Banking, Risk Management, Financial Market, Financial Regulation, Financial Services, Finance, Business Risk Management, Securities (Finance), Financial Policy, Capital Markets, Behavioral Economics, Banking, Corporate Finance, Governance, Insurance, Underwriting, Equities, Derivatives, Mortgage Loans, Decision Making
Coursera Project Network
Skills you'll gain: Process Analysis, Business Process, Business Analysis, Process Mapping, Workflow Management, Process Flow Diagrams, Business Modeling, Business Process Management, Stakeholder Management
- Status: Free
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Security Testing, Network Security, Network Monitoring, Operating Systems
- Status: Free
Stanford University
Skills you'll gain: Descriptive Statistics, Statistics, Statistical Methods, Sampling (Statistics), Statistical Analysis, Data Analysis, Statistical Hypothesis Testing, Regression Analysis, Statistical Inference, Probability, Exploratory Data Analysis, Quantitative Research, Probability Distribution, Correlation Analysis
In summary, here are 10 of our most popular vulnerability analysis courses
- Assets, Threats, and Vulnerabilities: Google
- Introduction to Cyber Attacks: New York University
- R Programming: Johns Hopkins University
- Data Analysis with R: Duke University
- Learn SQL Basics for Data Science: University of California, Davis
- Cybersecurity Case Studies and Capstone Project: IBM
- Threat Analysis: Cisco Learning and Certifications
- Malware Analysis and Introduction to Assembly Language: IBM
- Financial Markets: Yale University
- Business Analysis & Process Management: Coursera Project Network