筛选依据
主题必需的
语言必需的
在整个课程(说明和评估)中使用的语言。
了解产品必需的
级别必需的
课程长度必需的
技能必需的
字幕必需的
教师必需的
“vulnerability management” 的结果
您将获得的技能: Security Management, Vulnerability Assessments, Threat Management, IT Management, Security Strategy, Cyber Governance, Risk Management Framework, Security Controls, Cyber Risk, Security Awareness, Disaster Recovery
- 状态:免费试用
Infosec
您将获得的技能: IT 管理, 安全战略, 关键绩效指标 (KPI), 技术交流, 网络风险, 沟通, 管理团队, 风险管理, 网络安全战略, 领导与管理, 安全管理, 网络治理, 网络安全政策, 计划管理
您将获得的技能: Cyber Risk, Risk Management, Threat Management, IT Management, Security Controls, Security Management, Business Risk Management, Vulnerability Assessments, Cyber Security Assessment, Cyber Security Strategy, Cybersecurity, Threat Modeling, Cyber Security Policies, Information Assurance, Data Security, Technical Communication, Stakeholder Communications, Business Communication
- 状态:新
University of Maryland, College Park
您将获得的技能: Cybersecurity, Cyber Security Policies, Cyber Risk, Risk Management, Cyber Governance, Cyber Attacks, Stakeholder Engagement, Risk Mitigation, Cyber Security Strategy, Stakeholder Communications, Operational Risk, Enterprise Risk Management (ERM), Security Management, Risk Analysis, Cyber Security Assessment, Threat Modeling, Information Assurance, Risk Modeling, Governance, Vulnerability Assessments
- 状态:免费试用
University of California, Irvine
您将获得的技能: 资产保护, 风险分析, 供应商管理, 威胁管理, 风险管理, 网络安全战略, 尽职调查, 安全管理, 人为因素(安全), 培训计划, 安全意识
- 状态:新状态:免费试用
Macquarie University
您将获得的技能: Threat Modeling, Incident Response, Cyber Governance, Cyber Security Strategy, Threat Management, Cyber Risk, Cybersecurity, Cyber Attacks, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Threat Detection, Leadership, Compliance Management, Leadership and Management, Governance, Risk Management, ISO/IEC 27001, NIST 800-53, Resilience
Microsoft
您将获得的技能: 微软 Azure, 基础设施即服务(IaaS), 云计算, 无服务器计算, 安全战略, 云安全, 人工智能, 物联网, Network Security, 应用安全, 云计算管理, Distributed Denial-Of-Service (DDoS) 攻击, 防火墙
- 状态:新状态:免费试用
Macquarie University
您将获得的技能: Cyber Governance, Law, Regulation, and Compliance, Security Strategy, Culture Transformation, Enterprise Security, Cyber Operations, Communication, Business Risk Management, Business Leadership, Organizational Leadership, Leadership, Dashboard
- 状态:免费试用
Kennesaw State University
您将获得的技能: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Threat Detection, Information Privacy, Safety and Security, Multi-Factor Authentication
您将获得的技能: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Loss Prevention, Google Cloud Platform, Application Security, Threat Management, Vulnerability Management, Personally Identifiable Information, Data Security, Infrastructure Security, Event Monitoring, Threat Detection, Continuous Monitoring, Intrusion Detection and Prevention, System Monitoring, Security Information and Event Management (SIEM), Real Time Data
- 状态:免费试用
您将获得的技能: Splunk, Data Modeling, Role-Based Access Control (RBAC), System Monitoring, Incident Response, User Accounts, Security Information and Event Management (SIEM), Machine Learning, Event Monitoring, Systems Administration, Performance Tuning, Data Visualization, Threat Detection, Anomaly Detection, Continuous Monitoring, Correlation Analysis, Data Analysis, Authentications, Data Collection, Configuration Management
- 状态:免费试用
Infosec
您将获得的技能: 管理团队, 网络风险, 变革管理, 网络安全, 管理, 网络安全战略, 业务领导, 安全管理, 信息系统安全, 网络治理, 信息保障
与 vulnerability management 相关的搜索
总之,以下是 10 最受欢迎的 vulnerability management 课程
- Certified Information Security Manager (CISM): Packt
- 管理: Infosec
- Risk Management for Cyber Security Managers: Packt
- Cybersecurity Risk Management Across Critical Systems: University of Maryland, College Park
- 人员和第三方安全: University of California, Irvine
- Cyber Security: GRC Part 2 - Risk Management and Compliance: Macquarie University
- Microsoft Azure 管理工具和安全解决方案: Microsoft
- Cyber Security: Essentials for Managers and Leaders: Macquarie University
- Cybersecurity: What to Do When You Are a Victim: Kennesaw State University
- Mitigating Security Vulnerabilities on GC - Português: Google Cloud