Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
University of London
Skills you'll gain: Responsive Web Design, HTML and CSS, Web Design, Human Computer Interaction, Interaction Design, jQuery, Web Design and Development, Bootstrap (Front-End Framework), Hypertext Markup Language (HTML), User Experience Design, User Accounts, MongoDB, Wireframing, Web Applications, Interactive Data Visualization, JavaScript Frameworks, Technical Communication, Web Development Tools, Command-Line Interface, User Interface (UI)
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Stakeholder Communications, Incident Response, Intrusion Detection and Prevention, Threat Management, Business Risk Management, Network Security, Vulnerability Assessments, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Computer Security Incident Management, Security Awareness, Bash (Scripting Language), Event Monitoring, Security Controls, Cybersecurity, Debugging
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Penetration Testing, Application Security, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
- Status: Free
West Virginia University
Skills you'll gain: Internal Controls, Financial Controls, Threat Detection, Anomaly Detection, Financial Auditing, Cybersecurity, Financial Data, Investigation, Analytics, Specialized Accounting, Advanced Analytics, Security Awareness, Big Data, Business Ethics, Analysis, Compliance Reporting, Data Analysis Software, Ethical Standards And Conduct
EIT Digital
Skills you'll gain: Embedded Systems, Embedded Software, Internet Of Things, Cryptography, Operating Systems, Security Requirements Analysis, Network Architecture, Network Security, Cybersecurity, Real Time Data, Web Services, Encryption, Engineering Software, Network Protocols, Public Key Cryptography Standards (PKCS), Wireless Networks, Computer Programming, C (Programming Language), System Testing, System Design and Implementation
University of Geneva
Skills you'll gain: Portfolio Management, Wealth Management, Risk Management, Investment Management, Financial Market, Business Risk Management, Capital Markets, Investments, Market Liquidity, Asset Management, Performance Measurement, Market Dynamics, Environmental Social And Corporate Governance (ESG), Financial Planning, Derivatives, Finance, Equities, Financial Management, Performance Analysis, Business Ethics
University of Washington
Skills you'll gain: Regression Analysis, Predictive Modeling, Supervised Learning, Statistical Modeling, Applied Machine Learning, Machine Learning Algorithms, Feature Engineering, Machine Learning, Statistical Methods, Dimensionality Reduction, Python Programming, Data Validation
Kennesaw State University
Skills you'll gain: Network Security, Incident Response, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Computer Security Incident Management, Cyber Security Policies, Security Management, Firewall, Network Monitoring, Cyber Security Strategy, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Cyber Risk, Network Protocols, Risk Management
Google Cloud
Skills you'll gain: Kubernetes, Identity and Access Management, Cloud-Native Computing, Google Cloud Platform, CI/CD, Containerization, Application Deployment, Cloud Management, Scalability, Cloud Computing, Cloud Infrastructure, Load Balancing, Continuous Integration, DevOps, Continuous Delivery, YAML, Data Storage, Cloud Applications, Application Performance Management, Authorization (Computing)
Skills you'll gain: Virtualization, Disaster Recovery, Software-Defined Networking, Network Security, Computer Networking, Virtual Machines, IT Infrastructure, Firewall, Automation, Application Security, Data Centers
Palo Alto Networks
Skills you'll gain: Network Security, Cloud Security, Cyber Operations, DevSecOps, Cybersecurity, Cloud-Native Computing, Endpoint Detection and Response, Cyber Attacks, General Networking, TCP/IP, Zero Trust Network Access, Cryptography, Endpoint Security, Cyber Threat Intelligence, Malware Protection, Cloud Platforms, Firewall, Cloud Computing, Encryption, Security Information and Event Management (SIEM)
University of California, Irvine
Skills you'll gain: Cyber Governance, Threat Management, Security Management, Cyber Risk, Compliance Management, Risk Management, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Information Assurance, Program Standards, Computer Security
In summary, here are 10 of our most popular breach (security exploit) courses
- Responsive Website Development and Design:Â University of London
- Ciberseguridad de Google:Â Google
- Secure Coding Practices:Â University of California, Davis
- Forensic Accounting and Fraud Examination:Â West Virginia University
- Development of Secure Embedded Systems:Â EIT Digital
- Investment Management:Â University of Geneva
- Machine Learning: Regression:Â University of Washington
- Managing Cybersecurity:Â Kennesaw State University
- Architecting with Google Kubernetes Engine:Â Google Cloud
- Networking and Security Architecture with VMware NSX:Â VMware