Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
Skills you'll gain: Network Security, Cloud Computing, Network Infrastructure, Microsoft Azure, Firewall, Computer Networking, Virtualization and Virtual Machines, Networking Hardware, Cybersecurity, Network Protocols, Artificial Intelligence and Machine Learning (AI/ML)
Workday
Skills you'll gain: Workday (Software), Security Controls, Business Process, Workflow Management, Business Reporting, Human Resources Software, System Configuration, Role-Based Access Control (RBAC), Organizational Structure
Google Cloud
Skills you'll gain: Dataflow, Google Cloud Platform, Data Pipelines, Serverless Computing, Real Time Data, Dashboard, Identity and Access Management, Big Data, Data Visualization Software, Data Integration, Cloud Security, Performance Tuning, MLOps (Machine Learning Operations), CI/CD, Data Processing, Data Warehousing, Artificial Intelligence and Machine Learning (AI/ML), Application Performance Management, Debugging, Cloud Computing
- Status: Free
West Virginia University
Skills you'll gain: Internal Controls, Financial Controls, Threat Detection, Anomaly Detection, Financial Auditing, Cybersecurity, Financial Data, Investigation, Analytics, Specialized Accounting, Advanced Analytics, Security Awareness, Big Data, Business Ethics, Analysis, Compliance Reporting, Data Analysis Software, Ethical Standards And Conduct
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Information Privacy, Personally Identifiable Information, Regulatory Compliance, Compliance Management, Compliance Training, Data Security, Health Care Procedure and Regulation, Data Governance, Incident Response
Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, Infrastructure as Code (IaC), Cyber Security Policies, Security Controls, Security Strategy, Identity and Access Management, Threat Detection
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Network Security, Unix, Cybersecurity, Application Security, Linux, Web Applications, Infrastructure Security, Virtual Machines, Web Servers, Software Installation
- Status: Free
Georgia Institute of Technology
Skills you'll gain: User Experience Design, Prototyping, User Centered Design, Usability, Requirements Analysis, User Interface (UI), Interaction Design, Usability Testing, User Research
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Linux Commands, TCP/IP, General Networking, Scripting, MySQL, Data Structures
Google Cloud
Skills you'll gain: Cloud Management, Serverless Computing, Google Cloud Platform, Digital Transformation, Data Governance, Cloud Services, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Cloud Infrastructure, Artificial Intelligence and Machine Learning (AI/ML), Data Strategy, Application Programming Interface (API), Real Time Data, Business Transformation, Artificial Intelligence, Data Management, Hybrid Cloud Computing, Data Warehousing, Cloud Computing, Data Security
Skills you'll gain: Cybersecurity, Technical Support and Services, Information Technology, Network Security, Cyber Security Strategy, Computer Security Awareness Training, Application Security, Security Management
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Security, Cloud Infrastructure, Cloud Platforms, Cloud Computing, Cloud Storage, Infrastructure As A Service (IaaS), Emerging Technologies, Hybrid Cloud Computing, IBM Cloud, Serverless Computing, Virtualization, Microservices, Containerization
In summary, here are 10 of our most popular breach (security exploit) courses
- Introduction to Networking and Cloud Computing:Â Microsoft
- Workday Basics Series:Â Workday
- Vertex AI Search for Retail:Â Google Cloud
- Forensic Accounting and Fraud Examination:Â West Virginia University
- Privacy Law and Data Protection:Â University of Pennsylvania
- Strategies for Cloud Security Risk Management:Â Google Cloud
- An Introduction to Ethical Hacking with Kali Linux:Â Packt
- Introduction to User Experience Design :Â Georgia Institute of Technology
- Akamai Network Engineering:Â Akamai Technologies, Inc.
- Google Cloud Digital Leader Training:Â Google Cloud