Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability remediation guidance"
- Status: AI skills
Microsoft
Skills you'll gain: Storyboarding, User Research, Information Architecture, User Experience Design, Design Thinking, Prototyping, Usability Testing, Persona (User Experience), Wireframing, Design Research, User Interface and User Experience (UI/UX) Design, Interaction Design, Web Content Accessibility Guidelines, Human Centered Design, Usability, User Interface (UI) Design, User Centered Design, Figma (Design Software), Design, Mockups
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Cyber Risk, Threat Detection, Security Controls, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Security Strategy, Risk Management Framework, Security Controls, Enterprise Security, Information Privacy
- Status: New
Microsoft
Skills you'll gain: Web Scraping, Data Ethics, Data Structures, Generative AI, Git (Version Control System), Matplotlib, Version Control, Data Transformation, DevOps, Agile Methodology, Web Development, Data Cleansing, Flask (Web Framework), Scripting, GitHub, Pandas (Python Package), Debugging, Restful API, CI/CD, Test Driven Development (TDD)
Kennesaw State University
Skills you'll gain: Incident Response, Contingency Planning, Disaster Recovery, Computer Security Incident Management, Security Management, Crisis Management, Cybersecurity, Business Continuity, Cyber Attacks, Risk Analysis, Business Risk Management, Data Storage
Skills you'll gain: Vulnerability Management, Azure Active Directory, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Generative AI, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Single Sign-On (SSO), Microsoft Azure, Security Management, Cyber Security Policies, Identity and Access Management, Data Management, Records Management, Authentications, System Monitoring, Data Ethics, ChatGPT
Skills you'll gain: Network Security, Hardening, Network Protocols, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Hebrew University of Jerusalem
Skills you'll gain: Computer Architecture, Hardware Architecture, Computer Engineering, Computer Hardware, Computational Logic, Systems Architecture, Computer Programming, System Design and Implementation, Program Development, Data Storage
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
- Status: Free
Georgia Institute of Technology
Skills you'll gain: Structural Analysis, Mechanical Engineering, Engineering Analysis, Mechanics, Engineering, Engineering Calculations, Thermal Management, Applied Mathematics
École Polytechnique
Skills you'll gain: Peer Review, Writing and Editing, Journals, Scientific Methods, Research Reports, Research, Science and Research, Research Design, Proofreading, Research Methodologies, Editing, Ethical Standards And Conduct
In summary, here are 10 of our most popular vulnerability remediation guidance courses
- Microsoft UX Design: Microsoft
- The Foundations of Cybersecurity: Kennesaw State University
- The GRC Approach to Managing Cybersecurity: Kennesaw State University
- Microsoft Python Development: Microsoft
- Managing Cybersecurity Incidents and Disasters: Kennesaw State University
- Microsoft Azure Cybersecurity Tools and Solutions: Microsoft
- Connect and Protect: Networks and Network Security: Google
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Build a Modern Computer from First Principles: From Nand to Tetris (Project-Centered Course): Hebrew University of Jerusalem
- Cybersecurity Tools and Technologies: Microsoft