Cybersicherheits-Kurse können Ihnen helfen zu lernen, wie Systeme geschützt, Risiken erkannt und Vorfälle bewertet werden. Sie können Fähigkeiten in Netzwerksicherheit, Identitätsverwaltung, Bedrohungsanalyse und grundlegenden Sicherheitsmethoden aufbauen. Viele Kurse nutzen Tools, Dashboards und Beispiele, um typische Sicherheitsaufgaben zu veranschaulichen.

Kompetenzen, die Sie erwerben: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, Information Systems Security, Local Area Networks, Firewall, Windows PowerShell, Hardening, Threat Detection, Linux, Penetration Testing, Network Architecture, Wireless Networks, Vulnerability Assessments, System Configuration, IT Automation, Encryption, Network Analysis, Public Key Infrastructure
Mittel · Kurs · 1–4 Wochen

Kompetenzen, die Sie erwerben: Threat Modeling, Incident Response, IT Security Architecture, Secure Coding, Application Security, Identity and Access Management, Information Systems Security Assessment Framework (ISSAF), Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Security Strategy, Zero Trust Network Access, Security Awareness, Security Information and Event Management (SIEM), Risk Management Framework, Disaster Recovery, Security Requirements Analysis, Cybersecurity, Enterprise Architecture
Anfänger · Spezialisierung · 1–3 Monate

Johns Hopkins University
Kompetenzen, die Sie erwerben: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Cryptography, Cyber Threat Intelligence, Mobile Security, Security Testing, Brute-force attacks, Vulnerability Scanning, Network Security, Operating Systems, Encryption
Mittel · Spezialisierung · 3–6 Monate

Kompetenzen, die Sie erwerben: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Threat Modeling, Vulnerability Assessments, Cybersecurity, Enterprise Security, Network Security, Regulation and Legal Compliance, Data Security, Secure Coding, Key Management, Application Frameworks, Distributed Denial-Of-Service (DDoS) Attacks, Emerging Technologies, Data Integrity
Anfänger · Spezialisierung · 1–3 Monate

Johns Hopkins University
Kompetenzen, die Sie erwerben: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)
Mittel · Kurs · 1–3 Monate
Microsoft
Kompetenzen, die Sie erwerben: Reaktion auf Vorfälle, Sicherheitsinformationen und Ereignisverwaltung (SIEM), Generative KI, Endpunkt-Erkennung und -Reaktion, Jagd auf Cyber-Bedrohungen, Bewertung der Cybersicherheit, Microsoft Kopilot, Abfragesprachen, Microsoft Azure, Schnelles Engineering, AI-Sicherheit
Mittel · Kurs · 1–3 Monate

FAIR Institute
Kompetenzen, die Sie erwerben: Risk Analysis, Cyber Risk, Cyber Threat Intelligence, Threat Modeling, Cyber Security Strategy, Governance, Risk Management, Strategic Decision-Making, Enterprise Risk Management (ERM), Risk Mitigation, Business Risk Management, Strategic Prioritization, Compliance Reporting, Management Reporting, Business Communication
Mittel · Kurs · 1–4 Wochen

Packt
Kompetenzen, die Sie erwerben: Threat Management, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Public Key Infrastructure, IT Security Architecture, Disaster Recovery, Vulnerability Management, Regulation and Legal Compliance, Threat Detection, Cyber Security Assessment, Risk Management, Compliance Management, Regulatory Compliance, Network Security, Infrastructure Security, Cloud Security, Hardening, Security Engineering, Software-Defined Networking
Anfänger · Spezialisierung · 1–4 Wochen

Kompetenzen, die Sie erwerben: Penetration Testing, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Network Analysis, Exploitation techniques, Linux, Virtual Machines, Operating Systems
Gemischt · Kurs · 1–4 Wochen

Kompetenzen, die Sie erwerben: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Exploitation techniques, Brute-force attacks, Virtual Machines, Software Documentation, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Scripting, Remote Access Systems
Mittel · Kurs · 3–6 Monate

Kompetenzen, die Sie erwerben: Vector Databases, Embeddings, Generative AI, Databases, LLM Application, AI Personalization, Database Design, NoSQL, Database Management, Database Architecture and Administration
Anfänger · Kurs · 1–4 Wochen

Kompetenzen, die Sie erwerben: IT-Verwaltung, Rahmen für das Risikomanagement, Management von Bedrohungen, Sicherheitskontrollen, Cyber-Risiko, Cyber-Governance, Katastrophenhilfe, Sicherheitsmanagement, Bewertungen der Anfälligkeit, Sicherheitsstrategie, Sicherheitsbewußtsein
Mittel · Kurs · 1–4 Wochen