Cybersicherheits-Kurse können Ihnen helfen zu lernen, wie Systeme geschützt, Risiken erkannt und Vorfälle bewertet werden. Sie können Fähigkeiten in Netzwerksicherheit, Identitätsverwaltung, Bedrohungsanalyse und grundlegenden Sicherheitsmethoden aufbauen. Viele Kurse nutzen Tools, Dashboards und Beispiele, um typische Sicherheitsaufgaben zu veranschaulichen.

Johns Hopkins University
Kompetenzen, die Sie erwerben: AI-Sicherheit, Microsoft Windows, Erkennung von Bedrohungen, Klassifizierungsalgorithmen, Bewertung des Modells, Netzwerkanalyse, Netzwerksicherheit, Schutz vor Malware, Modellevaluation, Cybersecurity, Methoden des maschinellen Lernens, Erkennung von Anomalien
★ 4.7 (23) · Mittel · Kurs · 1–4 Wochen

Kompetenzen, die Sie erwerben: ISO/IEC 27001, Threat Management, Security Management, Risk Management Framework, Data Security, Cyber Risk, Risk Management, Vulnerability Management, Continuous Monitoring, Vulnerability Assessments, Cyber Security Policies, Security Controls, Governance Risk Management and Compliance, Cybersecurity, Information Systems, Scenario Testing, Asset Protection, Continuous Improvement Process
★ 5 (7) · Anfänger · Kurs · 3–6 Monate

LearnKartS
Kompetenzen, die Sie erwerben: Cyber Security Assessment, Security Testing, Cybersecurity, Cyber Threat Intelligence, Cyber Threat Hunting, Cyber Operations, Cyber Security Strategy, Cyber Attacks, Exploitation techniques, Problem Solving
★ 4.7 (65) · Mittel · Kurs · 1–4 Wochen

Kompetenzen, die Sie erwerben: Management von Bedrohungen, Datensicherheit, Containerisierung, Cloud-natives Computing, Sicherheitsmanagement, Cloud Computing, Beglaubigungen, Bewertungen der Anfälligkeit, Schwachstellen-Management, Identitäts- und Zugangsmanagement, Berechtigung (Computing), Infrastruktur als Code (IaC), Netzwerkanalyse, Datenverwaltung, Schlüsselverwaltung, Cyber-Angriffe, Multi-Faktor-Authentifizierung, Cloud-Sicherheit, Daten-Governance
★ 4.4 (47) · Anfänger · Kurs · 1–4 Wochen

Johns Hopkins University
Kompetenzen, die Sie erwerben: Penetration Testing, MITRE ATT&CK Framework, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Cryptography, Mobile Security, Cryptographic Protocols, Security Testing, Vulnerability Scanning, Cyber Security Assessment, Application Security, Operating System Administration, Network Security, Operating Systems, Encryption, Hardening
★ 4 (20) · Mittel · Spezialisierung · 3–6 Monate

Packt
Kompetenzen, die Sie erwerben: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, MITRE ATT&CK Framework, Systems Development Life Cycle, Cyber Governance, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Attacks, Network Infrastructure
★ 4.6 (16) · Mittel · Spezialisierung · 1–4 Wochen

Johns Hopkins University
Kompetenzen, die Sie erwerben: Generative Adversarial Networks (GANs), AI Security, Fraud detection, Model Evaluation, Feature Engineering, Cybersecurity, Cyber Security Strategy, Reinforcement Learning, Model Optimization, Data Synthesis
★ 4.4 (25) · Mittel · Kurs · 1–3 Monate

Kompetenzen, die Sie erwerben: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Exploit development, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Security Testing, Scripting, Vulnerability Assessments, Hardening, Brute-force attacks, General Networking, Scripting Languages, Shell Script, Network Administration, Cybersecurity, Network Security
★ 4.3 (47) · Anfänger · Spezialisierung · 3–6 Monate

LearnQuest
Kompetenzen, die Sie erwerben: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Cloud Security, Disaster Recovery, Threat Management, Firewall, Security Management, Network Security, Cybersecurity, Cloud Services, AI Security, Network Monitoring, Cyber Security Policies, Cloud Management
★ 4.4 (97) · Fortgeschritten · Spezialisierung · 1–3 Monate

Johns Hopkins University
Kompetenzen, die Sie erwerben: Intrusion Detection and Prevention, Model Evaluation, Incident Response, Threat Detection, Computer Security Incident Management, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Incident Management, Threat Management, Model Training, Continuous Monitoring, Cyber Security Policies, System Monitoring, AI Security, Virtual Machines, Network Security, Machine Learning Methods, Network Analysis, Data Analysis
★ 4.8 (8) · Mittel · Spezialisierung · 3–6 Monate

Johns Hopkins University
Kompetenzen, die Sie erwerben: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, LLM Application, Cybersecurity, Routing Protocols, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Intrusion Detection and Prevention, Security Controls, Threat Detection, Network Analysis, Internet Of Things, AI Integrations
★ 4 (10) · Mittel · Spezialisierung · 3–6 Monate

Kompetenzen, die Sie erwerben: Metasploit, Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Cyber Operations, Malware Protection, Network Protocols, Security Testing, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP)
★ 4.7 (25) · Mittel · Spezialisierung · 3–6 Monate