Properties (118)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Educational_Institution
|
gptkbp:collaboratesWith |
Industry Partners
|
gptkbp:conducts |
Research in Cyber Security
|
gptkbp:developsStrategiesFor |
Cyber_Security_Certifications
|
gptkbp:focusesOn |
Information Security
|
gptkbp:hasAlumni |
Top Tech Companies
|
gptkbp:hasFacility |
Network Security
|
gptkbp:hasPart |
Risk Management Training
Cybersecurity Awareness Training Cyber Defense Training Incident Response Training Digital Forensics Training Malware Analysis Training Security Compliance Training Blockchain Security Training Penetration Testing Training Advanced Persistent Threat Training Cyber Threat Intelligence Training Cybersecurity Framework Implementation Training Cybersecurity Framework Training Cybersecurity Leadership Training Cybersecurity Metrics Training Cybersecurity Risk Analysis Training Cybersecurity Risk Assessment Training Network Defense Training Security Architecture Training Vulnerability Assessment Training Cybersecurity_Awareness_Campaigns Cybersecurity_Incident_Response_Exercises Cybersecurity_Incident_Response_Technology_Training Cybersecurity_Incident_Response_Framework_Evaluation_Training Cybersecurity_Incident_Response_Documentation_Training Cybersecurity_Incident_Response_Evaluation_Training Cybersecurity_Incident_Response_Framework_Development_Training Cybersecurity_Incident_Management_Training Cybersecurity_Incident_Response_Analysis_Training Cybersecurity_Incident_Response_Hardware_Training Cybersecurity_Incident_Response_Planning_Training Cybersecurity_Incident_Response_Processes_Training Cybersecurity_Incident_Response_Recovery_Training Cybersecurity_Incident_Response_Strategy_Training Cybersecurity_Incident_Response_Tabletop_Exercises Cybersecurity_Incident_Response_Team_Training Cybersecurity_Policy_Development_Training Cybersecurity_Incident_Response_Framework_Strategy_Training Cybersecurity_Incident_Response_Communication_Training Security_Operations_Center_Training Cybersecurity_Incident_Response_Framework_Tools_Training Cybersecurity_Incident_Response_Framework_Assessment_Training Cybersecurity_Incident_Response_Framework_Software_Training Cybersecurity_Incident_Response_Framework_Systems_Training Cybersecurity_Incident_Response_Best_Practices_Training Cybersecurity_Incident_Response_Framework_Analysis_Training Cybersecurity_Incident_Response_Framework_Reporting_Training Cybersecurity_Incident_Response_Framework_Implementation_Training Cybersecurity_Incident_Response_Framework_Documentation_Training Cybersecurity_Incident_Response_Framework_Improvement_Training |
gptkbp:hosts |
Workshops
|
https://www.w3.org/2000/01/rdf-schema#label |
School of Cyber Security
|
gptkbp:isAttendedBy |
Relevant Accreditation Bodies
|
gptkbp:locatedIn |
Various Locations
|
gptkbp:offers |
Hands-on Training
Compliance Training Internship Opportunities Incident Management Training Cyber Security Programs Cybersecurity Tools Training Cybersecurity Ethics Courses Cybersecurity Policy Courses Cloud Security Courses IoT Security Courses Mobile Security Courses Privacy Law Courses Workshops on Ethical Hacking Cybersecurity Compliance Courses Cybersecurity Fundamentals Courses Cybersecurity Governance Courses Cybersecurity Strategy Courses Cybersecurity Training for Executives Data Protection Courses Secure Coding Courses Social Engineering Training Threat Hunting Courses Degree_Programs Security_Awareness_Programs Cybersecurity_Research_Opportunities Cybersecurity_Risk_Management_Courses Cybersecurity_Incident_Response_Framework_Metrics_Training Cybersecurity_Incident_Response_Framework_Hardware_Training Cybersecurity_Incident_Response_Simulation_Training Cybersecurity_Incident_Response_Framework_Evaluation_Training Cybersecurity_Incident_Response_Playbook_Development_Training Cybersecurity_Incident_Response_Framework_Development_Training Cybersecurity_Awareness_Workshops Cybersecurity_Incident_Response_Courses Cybersecurity_Incident_Response_Framework_Training Cybersecurity_Incident_Response_Metrics_Training Cybersecurity_Incident_Response_Reporting_Training Cybersecurity_Incident_Response_Software_Training Cybersecurity_Incident_Response_Systems_Training Cybersecurity_Incident_Response_Tools_Training Cybersecurity_Operations_Courses Digital_Risk_Management_Courses Cybersecurity_Incident_Response_Assessment_Training Cybersecurity_Incident_Response_Framework_Processes_Training Cybersecurity_Incident_Response_Improvement_Training Cybersecurity_Incident_Response_Framework_Assessment_Training Cybersecurity_Incident_Response_Framework_Reporting_Training Cybersecurity_Incident_Response_Framework_Best_Practices_Training Cybersecurity_Incident_Response_Framework_Implementation_Training Cybersecurity_Incident_Response_Framework_Documentation_Training Cybersecurity_Incident_Response_Framework_Technology_Training Cybersecurity_Incident_Response_Coordination_Training Cybersecurity_Incident_Response_Framework_Improvement_Training |
gptkbp:participatesIn |
Cyber Security Competitions
|
gptkbp:provides |
Online Courses
Scholarships Career_Services |