Cybersicherheits-Kurse können Ihnen helfen zu lernen, wie Systeme geschützt, Risiken erkannt und Vorfälle bewertet werden. Sie können Fähigkeiten in Netzwerksicherheit, Identitätsverwaltung, Bedrohungsanalyse und grundlegenden Sicherheitsmethoden aufbauen. Viele Kurse nutzen Tools, Dashboards und Beispiele, um typische Sicherheitsaufgaben zu veranschaulichen.

Edureka
Kompetenzen, die Sie erwerben: Computer Security Incident Management, IT Security Architecture, Incident Management, Cloud Infrastructure, Cloud Standards
★ 4.2 (12) · Anfänger · Kurs · 1–4 Wochen

Kompetenzen, die Sie erwerben: Digital Forensics, Risk Management, Risk Management Framework, Incident Response, Threat Management, Risk Analysis, Business Risk Management, Cyber Attacks, Cyber Security Policies, Security Management, Secure Coding, Computer Security Incident Management, Cyber Security Assessment, Application Security, ISO/IEC 27001, Law, Regulation, and Compliance, Data Security, Malware Protection, Incident Management, Penetration Testing
★ 4.3 (8) · Mittel · Kurs · 1–3 Monate

Kompetenzen, die Sie erwerben: Management von Zwischenfällen, Schnelles Engineering, ChatGPT, Cyber-Bedrohungsdaten, Überwachung von Ereignissen, Bewertungen der Anfälligkeit, Scannen auf Schwachstellen, AI-Sicherheit, Kontinuierliche Überwachung, Agentische Arbeitsabläufe, Generative AI-Agenten, Sicherheitsinformationen und Ereignisverwaltung (SIEM), Code-Überprüfung, AI-Arbeitsabläufe, Erkennung von Bedrohungen, Microsoft Azure, Reaktion auf Vorfälle, AI-Integrationen, OpenAI, Cloud-Sicherheit
Mittel · Kurs · 1–3 Monate

Kompetenzen, die Sie erwerben: Penetration Testing, Cybersecurity, Cyber Security Assessment, Anomaly Detection, Cyber Attacks, Threat Detection, AI Security, Security Awareness, Network Analysis, Generative AI, Prompt Engineering, Email Security, Unsupervised Learning, Applied Machine Learning
Anfänger · Kurs · 1–4 Wochen

Kompetenzen, die Sie erwerben: Metasploit, Exploit development, Exploitation techniques, Vulnerability, Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, System Configuration, Data Security, Cybersecurity, Cyber Attacks, Linux, Bash (Scripting Language), Proxy Servers, Scripting, Linux Commands, Scripting Languages, Python Programming
Gemischt · Kurs · 1–4 Wochen

Kompetenzen, die Sie erwerben: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Security Testing, Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Cyber Engineering, Cyber Governance, Risk Management Framework, Linux Administration, Dashboard Creation, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers
Anfänger · Kurs · 1–4 Wochen

Kompetenzen, die Sie erwerben: Vulnerability Assessments, Vulnerability Management, Vulnerability Scanning, Cyber Security Assessment, Hardening, Threat Management, Security Testing, Patch Management, Cyber Risk, Threat Detection, Cyber Threat Hunting, Application Security, Cyber Attacks, Cyber Engineering, Cyber Security Policies, Dashboard Creation, Cyber Security Strategy, Cyber Governance, Network Engineering, Web Applications
Mittel · Kurs · 1–4 Wochen

Kompetenzen, die Sie erwerben: Incident Response, Digital Forensics, Business Continuity Planning, Disaster Recovery, Computer Security Incident Management, Incident Management, Investigation, Business Continuity, Cybersecurity, Resource Management, Resource Allocation, Prioritization, Resource Planning, Business Analysis, Data Loss Prevention, Law, Regulation, and Compliance, Ethical Standards And Conduct
Anfänger · Kurs · 1–4 Wochen

Kompetenzen, die Sie erwerben: Exploitation techniques, Penetration Testing, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Event Monitoring, Vulnerability Management, Vulnerability, Continuous Monitoring, Data Security, Network Security, Analysis, Criminal Investigation and Forensics, System Monitoring, System Configuration, Network Monitoring, Bash (Scripting Language), Scripting, Linux, Python Programming
Fortgeschritten · Spezialisierung · 1–3 Monate

Kompetenzen, die Sie erwerben: Incident Response, Incident Management, IT Security Architecture, Security Architecture Review, Identity and Access Management, Continuous Monitoring, Network Security, Security Management, Security Awareness, Information Technology Architecture, Security Information and Event Management (SIEM), Application Security, Disaster Recovery, Security Controls, Cloud Security, Computer Security Awareness Training, Infrastructure Security, Threat Modeling, Cyber Security Policies, User Provisioning
Anfänger · Kurs · 1–4 Wochen

Starweaver
Kompetenzen, die Sie erwerben: Threat Modeling, Risk Analysis, Cyber Risk, Governance Risk Management and Compliance, Cyber Governance, Cyber Security Strategy, Threat Management, Risk Modeling, Risk Management Framework, Risk Management, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Risk Mitigation, Governance, Vulnerability Assessments, Management Reporting, Analysis, Risk Appetite, Technical Communication
Fortgeschritten · Kurs · 1–3 Monate

Kompetenzen, die Sie erwerben: AI Security, LLM Application, Cyber Security Assessment, Large Language Modeling, Continuous Monitoring, Security Testing, Responsible AI, Threat Modeling, Vulnerability Assessments, Prompt Engineering, Security Controls, Vulnerability Scanning, Security Strategy, AI Personalization, Exploitation techniques, System Implementation
Mittel · Kurs · 1–4 Wochen