Explore Courses in "Cyber security"


Description : Learners who complete this program will receive a 50% discount voucher to take the SC-900 Certification Exam. Organizations rely on cybersecurity experts to protect themselves from threats, but nearly 60% report security talent shortages.1 Prepare for a new career in this high-demand field with professional training from Microsoft — an industry-recognized leader in cybersecurity. You'll also have the option to learn how generative AI tools and techniques are used in cybersecurity analysis. The role of a cybersecurity analyst includes monitoring networks for vulnerabilities or potential threats, mitigating attacks on the network infrastructures, and implementing strategies for data protection. With 95% of fortune 500 companies using Azure, it’s critical for cybersecurity professionals to learn to protect data within an Azure environment.2 Through a mix of videos, assessments, and hands-on activities, you’ll learn, apply, and discuss threat mitigation strategies from an enterprise perspective, apply effective cybersecurity policy measures within an Azure environment, & practice on tools like MS defender, Azure Active Directory & more. When you graduate, you’ll have tangible examples to talk about in job interviews and you’ll also be prepared to take the Microsoft SC-900 Certification Exam. 1McKinsey & Company, Securing your organization to reduce cyber risk (June 2022) 2Microsoft Azure, Microsoft Azure:The only consistent, comprehensive hybrid cloud (Sept 2018)


Description : The global demand for cybersecurity professionals is set to surge by 6 million (Cybercrime Magazine). This IBM Professional Certificate gives you the essential skills you need to get your first job as a cybersecurity analyst. What do cybersecurity analysts do? Cybersecurity analysts protect an organization's systems and networks by monitoring for security breaches, analyzing threats, and implementing defensive measures to prevent cyberattacks. During this program, you’ll explore cybersecurity essentials, tools, and technologies, and learn about cyberattacks, operating systems, and networking fundamentals. You’ll dive into database fundamentals and vulnerabilities, cybersecurity architecture, compliance frameworks, standards, and regulations. You’ll explore using gen AI for cybersecurity. Plus, you’ll discover tools and strategies for job search, resume building, and interview preparation to kickstart your career. You’ll gain valuable hands-on experience in penetration testing, incident response, forensics, and threat intelligence. Plus, you’ll work on real-world projects developing cybersecurity plans and compliance frameworks, giving you great practical work to talk about in interviews. Once you’ve successfully completed this program, you’ll have an IBM Professional Certificate and digital badge showcasing skills you can add to your resume. Enroll today and prepare to launch your cybersecurity career in less than 6 months!


Description : Learners who complete this program will receive 50% off of the AZ-500 Microsoft Certification Exam. Did you know AZ-500 is amongst the highest paying Microsoft Azure certifications? With Azure being used by 95% of Fortune 500 companies, Azure security experts are in high demand. This program caters to IT students and professionals experienced in Microsoft Azure to gain in-demand skills for Azure security engineer jobs. Azure security engineers are responsible for implementing, managing, and overseeing security measures across Azure, multi-cloud, and hybrid environments to safeguard the entire infrastructure. Each course in this program combines concepts, practice exercises, and hands-on exercises in Azure. Assess your understanding with graded assessments and scenario-based projects. Complete this program and enjoy a dual advantage. First, earn a Professional Certificate showcasing your job readiness for the Azure security engineer associate role. Second, prepare for the AZ-500: Microsoft Azure Security Technologies certificate exam. Gain expertise in managing identity and access and securing network, compute, storage, and databases, and learn about managing security operations—aligned with the AZ-500 exam requirements. Through this program, you will gain skills that top-tier companies actively seek, showcasing your job-readiness for a career in security technologies. If you are an Azure administrator, this is the right course to steer your career toward IT security.


Description : Getting ISC2 Certified in Cybersecurity (CC) is the ideal way to start your cybersecurity career. This program gives you the knowledge you need to pass the CC certification exam and get your first job. No previous experience is required, and it proves to employers you have the fundamental cybersecurity skills they’re looking for. Cybersecurity specialists help protect the security of an organization’s infrastructure, network, applications, and data. During this program, you’ll look at IT essentials, including hardware, operating systems, and software. You’ll learn how networks operate, troubleshoot connectivity issues, and secure data storage systems. Plus, you’ll explore cloud computing. You’ll then dive into cybersecurity, learning to protect against threats like phishing and hacking, and explore security principles, incident response, and disaster recovery planning. You’ll gain practical experience with access controls, network security, and breach response. And you’ll complete a capstone project analyzing a real-world cybersecurity breach; great experience for interviews! Once you’ve completed the program, you’ll be fully prepared for the ISC2 Certified in Cybersecurity exam. PLUS, you’ll have a professional certificate and digital credential from IBM! If you’re keen to landyour first role as a cybersecurity specialist in just 4 months, enroll today!


26.50 Hours
Description : These courses focus on advanced penetration testing techniques and tools. Leveraging AI for Penetration Testing explores how artificial intelligence can enhance security testing. Penetration Testing with Metasploit dives into using Metasploit for exploiting vulnerabilities. Ethical Hacking: Vulnerability Analysis teaches how to identify and assess security weaknesses. Introduction to AWS Penetration Testing covers methods for testing AWS cloud environments. Penetration Testing Essential Training provides foundational knowledge on penetration testing. Building the Ultimate Cybersecurity Lab and Cyber Range guides setting up a virtual lab for testing. Complete Guide to Penetration Testing offers a comprehensive overview of penetration testing practices.


5.60 Hours
Description : These courses focus on advanced strategies for managing and mitigating cybersecurity risks. CRISC Cert Prep: 3 Risk Response and Reporting prepares learners for the Certified in Risk and Information Systems Control (CRISC) exam, covering effective risk response strategies and reporting techniques. Controlling Cybersecurity Risk with Defender Vulnerability Management teaches how to use Microsoft Defender to manage vulnerabilities and mitigate risks within an organization's security infrastructure. Implementing the NIST Risk Management Framework provides insights into applying the NIST framework for identifying, assessing, and managing cybersecurity risks, ensuring compliance with industry standards. Together, these courses equip professionals with the tools to proactively address and report on cybersecurity risks.


6.50 Hours
Description : This set of courses focuses on advanced threat detection and mitigation strategies for cybersecurity professionals. Modern Threat Hunting Strategies to Identify Attacks provides up-to-date techniques for uncovering complex cyber threats. Insider Threat Risk Management addresses strategies for identifying and mitigating risks from within an organization. The Threat Modeling series, including Repudiation, Tampering, Information Disclosure, and Spoofing in Depth, dives deep into various attack vectors, helping learners understand and defend against these threats. Identity Threat Protection with Sentinel teaches how to safeguard identities using Microsoft Sentinel. Lastly, Insider Threat Hunting: Detecting and Responding to Internal Security Risks equips professionals with the skills to detect and counter internal security breaches.


4.30 Hours
Description : This cybersecurity course suite addresses critical challenges and strategies for robust security management. Designing and Implementing Effective Cybersecurity Controls focuses on building resilient defenses, while Five Biggest Mistakes of Cybersecurity Programs helps identify and avoid common pitfalls. Cyber Crisis Management with NIST Cybersecurity Framework (CSF) 2.0 offers guidance for managing and recovering from cyber incidents using the latest standards. Mitigating Cybersecurity Vulnerabilities teaches practical approaches to reducing risks, and Top 10 Gotchas of Cyber Regulation explores compliance challenges and solutions in navigating complex cybersecurity regulations. Together, these courses provide actionable insights for effective cybersecurity leadership.
- Page 1 / 2