Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Regulatory Compliance, General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Communication Planning, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Business Ethics, Governance, Internal Controls, Risk Analysis
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Identity and Access Management, Business Risk Management, Security Controls
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, MITRE ATT&CK Framework, Vulnerability Assessments, Infrastructure Security, Distributed Denial-Of-Service (DDoS) Attacks, Application Security, Cybersecurity, Payment Card Industry (PCI) Data Security Standards, Cloud Security, Network Security, NIST 800-53, Security Testing, Internet Of Things, Technical Communication, Technical Writing, Scripting, General Data Protection Regulation (GDPR), Network Analysis
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Information Systems Security, Cybersecurity, Computer Security, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Algorithms
Skills you'll gain: Mac OS, Cyber Threat Intelligence, Network Security, Malware Protection, Threat Management, Endpoint Security, Threat Detection, Computer Security Awareness Training, Multi-Factor Authentication, Security Strategy, Information Systems Security, Firewall, Automation
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Security Controls, Security Testing, Virtual Machines, Application Security, Technical Documentation, Data Security, Web Servers, Linux
Palo Alto Networks
Skills you'll gain: Cyber Operations, Endpoint Detection and Response, Endpoint Security, Security Information and Event Management (SIEM), Zero Trust Network Access, Cybersecurity, Cyber Threat Intelligence, Threat Modeling, Continuous Monitoring, Security Controls, IT Security Architecture, Threat Detection, Incident Response, Malware Protection, Automation, Authentications, Data Lakes
University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Security Management, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, Risk Management Framework
Microsoft
Skills you'll gain: Data Security, Cloud Security, Azure Active Directory, Microsoft Azure, Data Storage, Encryption, Cloud Storage, Personally Identifiable Information, Authorization (Computing), Data Access, Authentications, Database Management, Data Governance, Key Management, Role-Based Access Control (RBAC), Firewall
University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geospatial Information and Technology, Encryption, Data Security, Network Security, Information Systems Security, Cryptography, Wireless Networks
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Infrastructure As A Service (IaaS), Cloud Applications, Cloud Security, Containerization, Data Loss Prevention, Cloud Storage, Network Infrastructure, Security Management, Cloud Computing, Encryption, Virtual Private Networks (VPN), Data Encryption Standard, Virtual Machines, Firewall, Application Security
Workday
Skills you'll gain: Workday (Software), Security Controls, Business Process, Workflow Management, Business Reporting, Human Resources Software, System Configuration, Role-Based Access Control (RBAC), Organizational Structure
In summary, here are 10 of our most popular breach (security exploit) courses
- Regulatory Compliance: University of Pennsylvania
- Tools for Security Specialists: Codio
- CompTIA PenTest+ (PT0-002): Packt
- Applied Cryptography: University of Colorado System
- Enhancing Mac Security: Strategies for Protection: LearnQuest
- Offensive Hacking Unfolded - Become a Pro Pentester: Packt
- Palo Alto Networks Security Operations Fundamentals: Palo Alto Networks
- Homeland Security & Cybersecurity Connection - It's Not About the Terrorists: University of Colorado System
- Secure Your Data at Rest: Microsoft
- Advanced System Security Topics: University of Colorado System