Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
University of Michigan
Skills you'll gain: Application Deployment, Django (Web Framework), Object-Relational Mapping, HTML and CSS, Model View Controller, jQuery, Ajax, Hypertext Markup Language (HTML), JSON, SQL, Databases, Application Development, Javascript, Object Oriented Programming (OOP), Web Development, Back-End Web Development, Data Modeling, Application Security, Web Applications, Web Servers
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Identity and Access Management, Business Risk Management, Security Controls
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Virtual Private Networks (VPN), Cloud Computing, Firewall, Network Security, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Authentications, Public Cloud
University of Illinois Urbana-Champaign
Skills you'll gain: Distributed Computing, Cloud Infrastructure, Cloud Services, Big Data, Apache Spark, Cloud Computing, Cloud Storage, Cloud Platforms, Network Architecture, Computer Networking, File Systems, Apache Hadoop, Network Infrastructure, Cloud Applications, Infrastructure As A Service (IaaS), General Networking, Software-Defined Networking, Containerization, NoSQL, Operating Systems
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Personally Identifiable Information, Law, Regulation, and Compliance, Information Privacy, Compliance Management, Health Care Procedure and Regulation, Data Security, Incident Response, Risk Analysis, Governance
Skills you'll gain: Django (Web Framework), Web Development, Web Servers, Web Applications, Data Modeling, MySQL, Application Security, Database Development, Object-Relational Mapping, Application Frameworks, Database Management, HTML and CSS, Restful API, Debugging
- Status: Free
Northeastern University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Ethics, Law, Regulation, and Compliance, Data Security, Journalism, Emerging Technologies, Digital Communications, Data Collection, Internet Of Things, Machine Learning, Artificial Intelligence
Columbia University
Skills you'll gain: Portfolio Management, Derivatives, Financial Market, Securities (Finance), Investment Management, Asset Management, Credit Risk, Mortgage Loans, Mathematical Modeling, Applied Mathematics, Capital Markets, Financial Modeling, Securities Trading, Regression Analysis, Market Liquidity, Futures Exchange, Risk Management, Equities, Finance, Market Data
Skills you'll gain: Secure Coding, Data Ethics, Vulnerability Assessments, Security Testing, Security Strategy, Security Engineering, Threat Modeling, Data Security, Penetration Testing, Security Controls, Artificial Intelligence, Cybersecurity, Threat Management, Encryption, Authorization (Computing)
University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Network Security, Digital Communications, Authentications, Data Integrity, Algorithms
Skills you'll gain: OAuth, API Gateway, Cloud API, Application Programming Interface (API), API Design, Restful API, Authentications, Security Controls, Authorization (Computing), Application Security, Information Systems Security, Network Security, Data Security, JSON, Identity and Access Management
University of Minnesota
Skills you'll gain: Enterprise Resource Planning, Business Systems Analysis, Systems Analysis, Requirements Analysis, Cybersecurity, Business Requirements, Business Systems, Cyber Threat Intelligence, Cloud Computing, Cloud Services, IT Management, Change Management, Business Technologies, Organizational Change, Technology Strategies, System Implementation, User Requirements Documents, Information Technology, Portfolio Management, Governance
In summary, here are 10 of our most popular breach (security exploit) courses
- Django for Everybody:Â University of Michigan
- Tools for Security Specialists:Â Codio
- Managing Security in Google Cloud:Â Google Cloud
- Cloud Computing:Â University of Illinois Urbana-Champaign
- Privacy Law and HIPAA:Â University of Pennsylvania
- Django Web Framework :Â Meta
- Data Privacy Fundamentals:Â Northeastern University
- Financial Engineering and Risk Management:Â Columbia University
- Security for Artificial Intelligence Software and Services:Â Board Infinity
- Cryptography:Â University of Maryland, College Park