Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
University of Pennsylvania
Skills you'll gain: Generative AI, Data Ethics, HR Tech, Data Governance, Big Data, Machine Learning, Data Security, Governance, Business Strategy, Human Resources, Organizational Strategy, Credit Risk, Business Transformation, Risk Management, Tensorflow, Personalized Service, Digital Transformation, Data-Driven Decision-Making, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence
Skills you'll gain: IT Infrastructure, Information Systems Security, Computer Networking, Desktop Support, Systems Administration, Network Troubleshooting, Remote Access Systems, Network Security, OSI Models, Package and Software Management, Application Security, Cybersecurity, Disaster Recovery, User Accounts, File Systems, TCP/IP, Lightweight Directory Access Protocols, Computer Hardware, Technical Support, Software Installation
University of Minnesota
Skills you'll gain: User Story, Agile Software Development, Software Design Patterns, Design Thinking, Software Development Methodologies, Agile Methodology, Agile Project Management, Process Mapping, Software Engineering, Kanban Principles, Software Development Life Cycle, Application Security, Scrum (Software Development), Object Oriented Design, Software Architecture, Software Quality (SQA/SQC), Requirements Analysis, Application Deployment, Lean Methodologies, Lean Manufacturing
University at Buffalo
Skills you'll gain: Model Based Systems Engineering, Systems Engineering, Product Lifecycle Management, Intrusion Detection and Prevention, Security Controls, Performance Measurement, Anomaly Detection, Machine Controls, Incident Response, Digital Transformation, Vulnerability Assessments, Software Development Life Cycle, Product Engineering, Cybersecurity, Supply Chain Management, Manufacturing Processes, Supply Chain Planning, Data Sharing, Manufacturing Operations, Constructive Feedback
Google Cloud
Skills you'll gain: Kubernetes, Identity and Access Management, Cloud-Native Computing, Google Cloud Platform, CI/CD, Containerization, Application Deployment, Cloud Management, Scalability, Cloud Computing, Cloud Infrastructure, Load Balancing, Continuous Integration, DevOps, Continuous Delivery, YAML, Data Storage, Cloud Applications, Application Performance Management, Authorization (Computing)
Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Security Controls, Vulnerability Assessments, Incident Response, Intrusion Detection and Prevention, Malware Protection, Network Architecture
Coursera Project Network
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Web Scraping, Web Applications
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Planning And Design, Network Architecture, General Networking, Network Performance Management, Computer Networking, Wireless Networks, Software-Defined Networking, Algorithms, System Programming, Data Integrity, Virtualization
LearnKartS
Skills you'll gain: Penetration Testing, Network Security, Malware Protection, Cybersecurity, Threat Detection, Information Systems Security, Cyber Threat Intelligence, Intrusion Detection and Prevention, Firewall, Cyber Attacks, Vulnerability Assessments, Internet Of Things, Encryption, Network Analysis
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Information Systems Security, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Personally Identifiable Information, Cloud Security
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Regulatory Compliance, General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Communication Planning, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Business Ethics, Governance, Internal Controls, Risk Analysis
In summary, here are 10 of our most popular breach (security exploit) courses
- AI For Business: University of Pennsylvania
- Soporte de Tecnologías de la Información de Google: Google
- Software Development Lifecycle: University of Minnesota
- Digital Manufacturing & Design Technology: University at Buffalo
- Architecting with Google Kubernetes Engine: Google Cloud
- Cybersecurity Assessment: CompTIA Security+ & CYSA+: IBM
- Web Application Security Testing with OWASP ZAP: Coursera Project Network
- Computer Communications: University of Colorado System
- System and Network Security: LearnKartS
- Cyber Security in Manufacturing : University at Buffalo