Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
New York University
Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Cyber Threat Hunting, Intrusion Detection and Prevention, Threat Management, Incident Response, Event Monitoring, Computer Security Incident Management, Network Analysis, Cybersecurity, Anomaly Detection, Network Security, Network Monitoring, Network Protocols, SQL
ConsenSys Academy
Skills you'll gain: Blockchain, Cryptography, Interoperability, Encryption, FinTech, Emerging Technologies, Distributed Computing, Digital Assets, Business Analysis, Systems Architecture, Transaction Processing
Skills you'll gain: API Design, Restful API, API Gateway, Application Programming Interface (API), Cloud API, Application Lifecycle Management, Proxy Servers, Cloud Applications, Software Design Documents, Software Documentation, Google Cloud Platform, Authentications
Microsoft
Skills you'll gain: Business Software, Computer Hardware, Hardware Architecture, Generative AI, Operating Systems, Data Storage Technologies, Computer Systems, Data Maintenance, Enterprise Security, System Software, Information Technology, OS Process Management, Data Storage, System Configuration, Microsoft Windows, Technical Support, Servers, Cybersecurity
Skills you'll gain: Virtualization, Disaster Recovery, Software-Defined Networking, Network Security, Computer Networking, Virtual Machines, IT Infrastructure, Firewall, Automation, Application Security, Data Centers
Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Email Security, Threat Detection, Jupyter, Authentications, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Threat Management, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning
Skills you'll gain: Blockchain, Digital Assets, FinTech, Plan Execution, Business Strategies, Business Strategy, Strategic Decision-Making, Payment Systems, Governance, Feasibility Studies, Financial Services, Financial Regulation, Work Breakdown Structure, Project Implementation, Market Opportunities, Financial Systems, Cryptography, Design, Emerging Technologies, Stakeholder Management
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Infrastructure As A Service (IaaS), Cloud Applications, Cloud Security, Containerization, Data Loss Prevention, Cloud Storage, Network Infrastructure, Security Management, Cloud Computing, Encryption, Virtual Private Networks (VPN), User Provisioning, Data Encryption Standard, Virtual Machines, Application Security
Qualcomm Academy
Skills you'll gain: Wireless Networks, Emerging Technologies, Internet Of Things, General Networking, Digital Communications, Data Security, Technology Strategies, Network Planning And Design, Network Infrastructure, Virtualization
University of Alberta
Skills you'll gain: Requirements Analysis, Requirements Elicitation, Requirements Management, Functional Requirement, Business Requirements, Product Requirements, Backlogs, User Requirements Documents, Scope Management, Change Control, User Story, System Requirements, Project Scoping, Product Roadmaps, Client Services, Agile Methodology, Prioritization
Skills you'll gain: Virtualization, Unix, IBM DB2, IBM Cloud, Data Management, Virtual Machines, Database Management Systems, Data Storage, Infrastructure Architecture, System Programming, Operating Systems, Unix Commands, IT Infrastructure, File Systems, System Monitoring, Computer Architecture, Servers, Control Panels, Command-Line Interface, Computing Platforms
In summary, here are 10 of our most popular breach (security exploit) courses
- Real-Time Cyber Threat Detection and Mitigation: New York University
- Threat Analysis: Cisco Learning and Certifications
- Blockchain: Foundations and Use Cases: ConsenSys Academy
- API Design and Fundamentals of Google Cloud's Apigee API Platform: Google Cloud
- Introduction to Computers: Microsoft
- Networking and Security Architecture with VMware NSX: VMware
- Introduction to AI for Cybersecurity: Johns Hopkins University
- Blockchain Revolution in Financial Services: INSEAD
- Security in Google Cloud 日本語版: Google Cloud
- 5G for Everyone: Qualcomm Academy