Cybersicherheits-Kurse können Ihnen helfen zu lernen, wie Systeme geschützt, Risiken erkannt und Vorfälle bewertet werden. Sie können Fähigkeiten in Netzwerksicherheit, Identitätsverwaltung, Bedrohungsanalyse und grundlegenden Sicherheitsmethoden aufbauen. Viele Kurse nutzen Tools, Dashboards und Beispiele, um typische Sicherheitsaufgaben zu veranschaulichen.

LearnKartS
Kompetenzen, die Sie erwerben: Security Controls, Information Systems Security, Cybersecurity, Application Security, Cryptography, Data Security, Threat Management, Computer Security, Enterprise Security, Security Engineering, Blockchain, Zero Trust Network Access, Information Assurance, Threat Detection, Encryption, Authentications, Public Key Infrastructure, Vulnerability Assessments, Authorization (Computing), Data Integrity
Anfänger · Kurs · 1–4 Wochen

Johns Hopkins University
Kompetenzen, die Sie erwerben: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Cryptography, Cyber Threat Intelligence, Mobile Security, Security Testing, Brute-force attacks, Vulnerability Scanning, Network Security, Operating Systems, Encryption
Mittel · Spezialisierung · 3–6 Monate

Kennesaw State University
Kompetenzen, die Sie erwerben: Risikoanalyse, Bewertung der Cybersicherheit, Präsentationen, Governance, Management von Bedrohungen, Cyber-Risiko, Cyber-Sicherheitsstrategie, Vermögensverwaltung, Risikomanagement, Sicherheitsmanagement, Modellierung von Bedrohungen, Cybersicherheit, Projektdokumentation
Mittel · Kurs · 1–3 Monate

Kompetenzen, die Sie erwerben: Incident Response, Network Security, Intrusion Detection and Prevention, Computer Security Incident Management, Command-Line Interface, Cryptography, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cybersecurity, Encryption, Information Systems Security, Vulnerability Assessments, Cyber Attacks, Security Engineering, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
Mittel · Spezialisierung · 3–6 Monate

Northeastern University
Kompetenzen, die Sie erwerben: Health Informatics, Health Information Management, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Care Administration, Digital Transformation, Healthcare Industry Knowledge, Health Care Procedure and Regulation, Emerging Technologies, Information Privacy, Data Management, Technology Strategies, Cybersecurity, Data Security, Platform As A Service (PaaS), Innovation
Anfänger · Kurs · 1–4 Wochen

Kompetenzen, die Sie erwerben: Technisches Schreiben, Risikominderung, Scannen auf Schwachstellen, Management von Bedrohungen, Bewertung der Cybersicherheit, Netzwerkanalyse, Cyber Threat Intelligence, Notfallmaßnahmen, Erkennung von Bedrohungen, Reaktion auf Vorfälle, Bewertungen der Anfälligkeit, Cybersicherheit, Sicherheitsstrategie
Mittel · Kurs · 1–4 Wochen

Kompetenzen, die Sie erwerben: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Brute-force attacks, Cryptography, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Data Import/Export, MySQL, Encryption, Mobile Security, Linux, Linux Administration
Anfänger · Spezialisierung · 3–6 Monate

Coursera
Kompetenzen, die Sie erwerben: Linux-Befehle, Befehlszeilen-Schnittstelle, Dateiverwaltung, Unix-Befehle, Dateisysteme, Skripting, Shell-Skript, Systemverwaltung, Unix, Unix-Shell, Linux, Bash (Skriptsprache)
Anfänger · angeleitetes Projekt · Weniger als 2 Stunden

Johns Hopkins University
Kompetenzen, die Sie erwerben: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Responsible AI, Network Routing, Infrastructure Security, Application Security
Mittel · Spezialisierung · 3–6 Monate

Packt
Kompetenzen, die Sie erwerben: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, Cyber Governance, Intrusion Detection and Prevention, Risk Management Framework, Cyber Threat Intelligence, Network Infrastructure, Network Security, Security Information and Event Management (SIEM)
Mittel · Spezialisierung · 1–4 Wochen

Kompetenzen, die Sie erwerben: Exploit development, OSI Models, Network Security, Exploitation techniques, TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP), General Networking, Security Awareness
Mittel · Spezialisierung · 3–6 Monate

Kompetenzen, die Sie erwerben: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Anomaly Detection, Cybersecurity, Security Controls, Data Analysis Software, Risk Management Framework
Anfänger · Kurs · 1–4 Wochen