Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
areas of information and cyber security, focusing on fundamental aspects as well as on applications in multi-disciplinary contexts. We work in collaboration with leading national and international
-
Cybersecurity Operations is responsible for ensuring the daily protection of the Mason enterprise by developing secure business processes, monitoring cyber threats, and responding to security incidents
-
Missouri University of Science and Technology | Rolla, Missouri | United States | about 12 hours ago
controllers, PLCs, and industrial automation Applied control systems Robotics, manufacturing automation, and cyber-physical systems Develop and deliver laboratory-intensive and project-based courses. Coordinate
-
develop undergraduate and postgraduate modules related to Cyber Security. An evidenced track record is required within two or more of the following areas of Cyber Security: Pen-testing, Ethical hacking
-
to assess system vulnerabilities in a controlled and ethical manner, and design and evaluate detection capabilities, including intrusion detection mechanisms, to identify and mitigate cyber threats
-
security, Cyber Physical Systems security, security analytics, digital forensics, vulnerability assessment, malware analysis and defence, Privacy-enhancing technologies, AI security. Computer Science and
-
at the candidate's discretion. For more information about the required documents and recruitment process, please contact konkurss@taltech.ee . Where to apply Website https://taltech.teamdash.com/p/job/yjrAvsht
-
) in Business Intelligence and Data Analytics Cyber Security Management Digital Enterprise and Cloud Management Entrepreneurship Finance General Business Healthcare Management Health Informatics
-
processes based on mobile digital technologies increase, so do the amount and severity of cyber threats. Both defenders and attackers are now using Machine Learning (ML) and Artificial Intelligence (AI
-
penetration testing tools ● Deep technical knowledge of computer networking concepts and protocols, network security methodologies, cyber threats and vulnerabilities, authentication, authorization, and