Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Cybersecurity, Virtual Private Networks (VPN), Remote Access Systems, Network Protocols, Vulnerability Assessments, Encryption, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Endpoint Security, Threat Detection, Incident Response
The Hong Kong University of Science and Technology
Skills you'll gain: FinTech, Financial Regulation, Business Continuity Planning, Compliance Management, Disaster Recovery, Financial Regulations, Operational Risk, Bank Regulations, Financial Services, Security Management, Risk Management, Business Risk Management, Information Technology, Law, Regulation, and Compliance, Market Trend, Banking Services, Financial Systems, Emerging Technologies, Workforce Development, Banking
- Status: Free
Stanford University
Skills you'll gain: Gerontology, Community and Social Work, Social Justice, Socioeconomics, Human Services, Advocacy, Education and Training, Health Care, Cultural Diversity, Labor Law, Infectious Diseases, Pediatrics, Economics, Public Safety and National Security
Google Cloud
Skills you'll gain: Google Docs, Gmail, Google Sheets, Google Workspace, Presentations, Calendar Management, Spreadsheet Software, File Management, Excel Formulas, Productivity Software, Email Security, Document Management, Data Visualization, Excel Macros, Data Validation, Setting Appointments, Version Control, Meeting Facilitation, Sales Presentations, Collaboration
University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Network Security, Digital Communications, Authentications, Data Integrity, Algorithms
- Status: [object Object]
Google Cloud
Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Generative AI, DevSecOps, Cloud Computing, Data Security, Google Cloud Platform, Cybersecurity
Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment, Penetration Testing, Network Security, Security Testing, Network Monitoring, Software Installation, System Configuration, Microsoft Windows, Linux, Integration Testing, Operating Systems
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Continuous Monitoring, Business Continuity, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Application Security, Incident Management, Security Engineering, Data Security, Network Security, User Provisioning, OSI Models, Data Loss Prevention
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
- Status: [object Object]
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, Operating Systems, Network Protocols, TCP/IP, Application Security, Microsoft Teams, Productivity Software, Information Systems Security, Multi-Factor Authentication
University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Application Security, Cryptography, Data Storage
In summary, here are 10 of our most popular breach (security exploit) courses
- Security & Ethical Hacking: Attacking the Network:Â University of Colorado Boulder
- Cybersecurity Solutions and Microsoft Defender:Â Microsoft
- FinTech: Finance Industry Transformation and Regulation:Â The Hong Kong University of Science and Technology
- International Women's Health and Human Rights:Â Stanford University
- Getting started with Google Workspace:Â Google Cloud
- Cryptography:Â University of Maryland, College Park
- Google Cloud Cybersecurity:Â Google Cloud
- Nessus Scanner - Network Scanning from Beginner to Advanced:Â Packt
- CISSP Certified Information Systems Security Professional:Â Packt
- Cybersecurity Tools and Technologies:Â Microsoft