Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
Skills you'll gain: Linux Commands, Linux, Penetration Testing, General Networking, Network Security, Cybersecurity, Vulnerability Assessments, Data Ethics, Computer Security Awareness Training, System Configuration, Software Installation, Virtual Machines
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Cyber Governance, Risk Mitigation, Vendor Management, Risk Modeling, Threat Management, Vulnerability Assessments, Security Management, Cyber Risk, Compliance Management, Cyber Security Policies, Cybersecurity, Security Awareness, Cyber Security Strategy
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Cryptography, Security Engineering, Threat Modeling, Authorization (Computing), Encryption, Email Security, Data Integrity, Authentications, Verification And Validation
Amazon Web Services
Skills you'll gain: Amazon Web Services, Amazon CloudWatch, AWS Identity and Access Management (IAM), Cloud Services, Cloud Computing, Cloud Infrastructure, Amazon Elastic Compute Cloud, Cloud Management, Cloud Security, Amazon S3, Cloud Computing Architecture, System Monitoring, Data Migration, Scalability
- Status: Free
Princeton University
Skills you'll gain: Blockchain, Cryptography, Encryption, Payment Systems, FinTech, Key Management, Digital Assets, Network Protocols, Cybersecurity, Transaction Processing, Distributed Computing, Emerging Technologies, Scripting, Financial Regulation, Public Affairs, Market Dynamics
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
Skills you'll gain: Azure Active Directory, Data Security, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Cloud Security, Active Directory, Threat Modeling, Security Strategy, Authentications, Data Storage, Application Security, Database Architecture and Administration, Virtual Machines, Infrastructure Security, Kubernetes, Continuous Monitoring, Web Applications, System Monitoring, Network Security
Indian School of Business
Skills you'll gain: Financial Statements, Peer Review, Financial Statement Analysis, Financial Trading, Balance Sheet, Portfolio Management, Securities Trading, Financial Accounting, Income Statement, Data Collection, Market Liquidity, Investment Management, Financial Analysis, Performance Analysis, Project Design, Financial Market, Accruals, Market Trend, Performance Measurement, Technical Analysis
Skills you'll gain: Application Security, Security Testing, Software Testing, Cyber Security Assessment, Cryptography, Penetration Testing, Encryption, Authentications, Identity and Access Management, Business Logic, Test Case, Vulnerability Assessments, Web Servers, Data Validation, Network Protocols
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Linux Commands, TCP/IP, General Networking, Scripting, MySQL, Data Structures
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Vulnerability Scanning, Encryption, Key Management, Virtual Machines
SkillUp EdTech
Skills you'll gain: Blockchain, Cryptography, Encryption, Application Security, Threat Modeling, Cybersecurity, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments
In summary, here are 10 of our most popular breach (security exploit) courses
- Ethical Hacking Foundations:Â Packt
- Introduction to Cybersecurity & Risk Management:Â University of California, Irvine
- Design and Analyze Secure Networked Systems:Â University of Colorado System
- AWS Cloud Practitioner Essentials:Â Amazon Web Services
- Bitcoin and Cryptocurrency Technologies:Â Princeton University
- Security Concepts and Practices:Â ISC2
- Microsoft Azure Security Engineer Associate (AZ-500):Â Microsoft
- Trading Strategies in Emerging Markets:Â Indian School of Business
- Software Security Testing:Â Packt
- Akamai Network Engineering:Â Akamai Technologies, Inc.