Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Application Security, Cryptography, Data Storage
New York University
Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
Google Cloud
Skills you'll gain: Vulnerability Scanning, Google App Engine, Security Testing, Application Security, Secure Coding, Cloud Security, Google Cloud Platform
Palo Alto Networks
Skills you'll gain: Cloud Security, DevSecOps, Cloud-Native Computing, Cloud Platforms, Cloud Computing, Infrastructure Security, DevOps, Software As A Service, Public Cloud, Network Security, CI/CD, Docker (Software), Containerization, Hybrid Cloud Computing, Serverless Computing, Vulnerability Scanning, Data Centers, Virtualization
EC-Council
Skills you'll gain: Network Security, Mobile Security, Public Key Infrastructure, Cryptography, Security Controls, Cybersecurity, Authorization (Computing), Authentications, Identity and Access Management, Wireless Networks, Cloud Computing, Cloud Security, Network Monitoring, Data Security, Internet Of Things, Virtualization and Virtual Machines
University of Colorado System
Skills you'll gain: Requirements Elicitation, Software Design Documents, Requirements Analysis, Security Requirements Analysis, Mockups, Interviewing Skills, User Requirements Documents, Storyboarding, Functional Requirement, Goal Setting, Software Documentation, Agile Methodology, Business Requirements, Unified Modeling Language, Risk Management Framework, System Requirements, Meeting Facilitation, Prototyping, Software Development Life Cycle, Technical Documentation
Skills you'll gain: Virtualization, IBM Cloud, Virtual Machines, Infrastructure Architecture, IT Infrastructure, Computer Architecture, Data Centers, Computer Systems, Information Systems Security, Computer Hardware, Cryptography, Transaction Processing
LearnQuest
Skills you'll gain: Threat Management, Remote Access Systems, Vulnerability Assessments, Application Security, Threat Detection, Security Requirements Analysis, Cyber Security Assessment, Cybersecurity, Security Software, Security Management, Infrastructure Security, Telecommuting, Cyber Risk, Cyber Security Strategy, Cyber Security Policies, Endpoint Security, Security Controls, Virtual Private Networks (VPN), Risk Management Framework, Multi-Factor Authentication
The Hong Kong University of Science and Technology
Skills you'll gain: Financial Regulation, Financial Regulations, Bank Regulations, FinTech, Financial Services, Law, Regulation, and Compliance, Mobile Banking, Regulatory Requirements, Compliance Management, Data Security, Cybersecurity, Insurance, Blockchain, Security Controls, Investigation
University of Minnesota
Skills you'll gain: Enterprise Resource Planning, Business Systems Analysis, Systems Analysis, Requirements Analysis, Cybersecurity, Business Requirements, Business Systems, Cyber Threat Intelligence, Cloud Computing, Cloud Services, IT Management, Change Management, Business Technologies, Organizational Change, Technology Strategies, System Implementation, User Requirements Documents, Information Technology, Portfolio Management, Governance
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Security Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Cybersecurity, Application Security, Firewall, Web Applications, Network Security, Wireless Networks, Command-Line Interface, Microsoft Windows, Virtual Machines, SQL
Indian School of Business
Skills you'll gain: Financial Statements, Financial Statement Analysis, Financial Trading, Balance Sheet, Securities Trading, Financial Accounting, Income Statement, Financial Analysis, Market Liquidity, Financial Market, Market Dynamics, Financial Modeling, Market Analysis, Cash Flows, Equities, Investment Management, Order Management, Risk Analysis
In summary, here are 10 of our most popular breach (security exploit) courses
- Networking and Security in iOS Applications:Â University of California, Irvine
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- Cloud Security Scanner: Qwik Start:Â Google Cloud
- Palo Alto Networks Cloud Security Fundamentals:Â Palo Alto Networks
- Network Defense Essentials (NDE):Â EC-Council
- Requirements Engineering: Secure Software Specifications:Â University of Colorado System
- Introduction to Enterprise Computing:Â IBM
- Fundamentals of Remote Team Security:Â LearnQuest
- FinTech Security and Regulation (RegTech):Â The Hong Kong University of Science and Technology
- Information​ ​Systems: University of Minnesota