Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability analysis"
Coursera Project Network
Skills you'll gain: Microsoft Excel, Excel Formulas, Spreadsheet Software, Pivot Tables And Charts, Data Analysis, Data Manipulation, Data Mining
- Status: [object Object]
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
Tableau Learning Partner
Skills you'll gain: Requirements Elicitation, Business Analysis, Business Metrics, Key Performance Indicators (KPIs), Requirements Analysis, Business Requirements, Process Analysis, Stakeholder Management, Business Process, Business Process Modeling, Tableau Software, Data Visualization
Skills you'll gain: Data Ethics, Data Analysis, Data Security, Google Sheets, Databases, Data Storage, Data Quality, Data Integrity, Data Management, Data Collection, Data Manipulation, Relational Databases, SQL, Metadata Management, Unstructured Data
Tableau Learning Partner
Skills you'll gain: Data Storytelling, Exploratory Data Analysis, Requirements Elicitation, Ad Hoc Reporting, Data Governance, Data Ethics, Tableau Software, Business Analysis, Data Visualization Software, Data Warehousing, Business Metrics, Dashboard, Statistical Visualization, Extract, Transform, Load, Data Analysis, Spatial Data Analysis, Data Quality, Data Management, Descriptive Statistics, Interactive Data Visualization
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: SQL, Databases, Stored Procedure, Relational Databases, Database Design, Query Languages, Database Management, Data Analysis, Jupyter, Data Manipulation, Pandas (Python Package), Transaction Processing
Johns Hopkins University
Skills you'll gain: Exploratory Data Analysis, Data Visualization, Ggplot2, Dimensionality Reduction, Data Visualization Software, R Programming, Graphing, Data Storytelling, Data Analysis, Statistical Analysis, Unsupervised Learning, Statistical Methods
- Status: Free
Skills you'll gain: Requirements Management, Robotic Process Automation, Requirements Elicitation, Business Process Automation, Requirements Analysis, Business Requirements, Stakeholder Engagement, Business Analysis, Automation, Business Process, Process Analysis, Stakeholder Communications, Project Scoping, Process Mapping, Technical Documentation
Skills you'll gain: Security Controls, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Security Policies, Network Analysis, Security Information and Event Management (SIEM), Ethical Standards And Conduct, SQL
University of California, Davis
Skills you'll gain: Data Governance, SQL, Data Quality, Query Languages, Data Manipulation, Data Modeling, Relational Databases, Data Science, Data Analysis, Database Management Systems, Descriptive Statistics
- Status: Free
Johns Hopkins University
Skills you'll gain: Risk Modeling, Regression Analysis, Microsoft Excel, Business Analytics, Business Process Modeling, Business Risk Management, Business Modeling, Data Modeling, Resource Allocation, Statistical Analysis, Mathematical Modeling, Process Optimization, Financial Analysis, Spreadsheet Software, Predictive Analytics, Transportation Operations
In summary, here are 10 of our most popular vulnerability analysis courses
- Introduction to Data Analysis using Microsoft Excel: Coursera Project Network
- Microsoft Cybersecurity Analyst: Microsoft
- Business Analysis Process: Tableau Learning Partner
- Prepare Data for Exploration: Google
- Tableau Business Intelligence Analyst: Tableau Learning Partner
- IBM Cybersecurity Analyst: IBM
- Databases and SQL for Data Science with Python: IBM
- Exploratory Data Analysis: Johns Hopkins University
- Automation Business Analysis - Concepts and Principles: UiPath
- Foundations of Cybersecurity: Google