Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
DeepLearning.AI
Skills you'll gain: Database Design, Software Documentation, Software Design Patterns, Database Systems, Software Testing, ChatGPT, Technical Documentation, Generative AI, Software Design, Code Review, Software Architecture, Software Systems, System Design and Implementation, Dependency Analysis, Artificial Intelligence, Software Development Tools, OpenAI, Software Development, Natural Language Processing, Debugging
Kennesaw State University
Skills you'll gain: Internet Of Things, Cybersecurity, Cyber Security Strategy, Mobile Security, Security Awareness, Wireless Networks, Information Privacy, Network Security, Data Security, Emerging Technologies, Risk Management Framework
Fortinet, Inc.
Skills you'll gain: Firewall, Virtual Private Networks (VPN), Network Troubleshooting, Network Routing, Network Security, Intrusion Detection and Prevention, Network Administration, Authentications, Network Monitoring, Event Monitoring, Lightweight Directory Access Protocols, Security Information and Event Management (SIEM), Security Engineering, Threat Management, Network Performance Management, Enterprise Security, Systems Administration, Network Architecture, Security Management, Network Infrastructure
Google Cloud
Skills you'll gain: Google Docs, Gmail, Google Sheets, Google Workspace, Presentations, Calendar Management, Spreadsheet Software, File Management, Excel Formulas, Productivity Software, Email Security, Document Management, Data Visualization, Excel Macros, Data Validation, Setting Appointments, Version Control, Meeting Facilitation, Sales Presentations, Collaboration
Skills you'll gain: OAuth, API Design, Restful API, API Gateway, Application Programming Interface (API), Cloud API, Continuous Deployment, Application Deployment, Authentications, Google Cloud Platform, Application Lifecycle Management, Security Controls, Proxy Servers, Authorization (Computing), Continuous Integration, Cloud Applications, Application Security, Software Design Documents, Software Documentation, Information Systems Security
Google
Skills you'll gain: Systems Administration, IT Security Architecture, Remote Access Systems, IT Infrastructure, Hardening, Network Troubleshooting, OSI Models, Computer Networking, Routing Protocols, Desktop Support, Application Security, Security Strategy, Server Administration, Technical Support, Lightweight Directory Access Protocols, Microsoft Windows, File Systems, Computer Hardware, Software Installation, Help Desk Support
University of Geneva
Skills you'll gain: Financial Market, Capital Markets, Market Liquidity, Portfolio Management, Investments, Market Dynamics, Derivatives, Finance, Equities, Financial Policy, Economics, Real Estate, Banking, Risk Management
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Application Security, Vulnerability Assessments, Vulnerability Management, Event Monitoring, Security Controls, Data Integrity, Patch Management, Network Security
Skills you'll gain: Identity and Access Management, Cloud Security, DevSecOps, Cloud Computing, Role-Based Access Control (RBAC), Google Cloud Platform, Network Security, Cloud Computing Architecture, IT Automation, General Networking, Infrastructure Security, Security Controls, Infrastructure as Code (IaC), Virtualization
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
University of Washington
Skills you'll gain: Regression Analysis, Predictive Modeling, Supervised Learning, Statistical Modeling, Applied Machine Learning, Machine Learning Algorithms, Feature Engineering, Machine Learning, Statistical Methods, Dimensionality Reduction, Python Programming, Data Validation
- Status: Free
Stanford University
Skills you'll gain: Physics, Timelines, Scientific Methods, Research, Experimentation, Mechanics, Mathematical Modeling
In summary, here are 10 of our most popular breach (security exploit) courses
- Generative AI for Software Development:Â DeepLearning.AI
- Cybersecurity and the Internet of Things:Â Kennesaw State University
- Fortinet Network Security:Â Fortinet, Inc.
- Getting started with Google Workspace:Â Google Cloud
- Developing APIs with Google Cloud's Apigee API Platform:Â Google Cloud
- Suporte em TI do Google:Â Google
- Understanding Financial Markets:Â University of Geneva
- OWASP Top 10 - Risks 6-10:Â Infosec
- Introduction to Security Principles in Cloud Computing:Â Google Cloud
- Cybersecurity Tools and Technologies:Â Microsoft