Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
University of Pennsylvania
Skills you'll gain: Blockchain, Cryptography, Digital Assets, Investments, Portfolio Management, Investment Management, FinTech, Asset Management, Financial Analysis, Financial Market, Emerging Technologies, Public Key Infrastructure, Finance, Payment Systems, Encryption, Return On Investment, Data Security, Data Integrity, Risk Analysis
Skills you'll gain: NIST 800-53, Risk Management Framework, Cyber Risk, Federal Information Security Management Act, Cybersecurity, Risk Management, Security Management, Cyber Governance, Cyber Security Strategy, Operational Risk, Governance Risk Management and Compliance, Security Controls, Continuous Monitoring, Infrastructure Security, Cyber Security Assessment, Enterprise Risk Management (ERM), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
- Status: Free
Campus BBVA
Skills you'll gain: Incident Management, Crisis Management, Security Information and Event Management (SIEM), Data Security, Cybersecurity, Cyber Attacks, Security Strategy, Information Systems Security, Cyber Operations, Information Assurance, Data Processing, Security Awareness, Network Security, Anomaly Detection, Data Science, Time Series Analysis and Forecasting, Unsupervised Learning
University of Michigan
Skills you'll gain: Data Ethics, Information Privacy, Personally Identifiable Information, Data Security, Data Governance, Ethical Standards And Conduct, Big Data, Law, Regulation, and Compliance, Data Analysis, Social Sciences, Data-Driven Decision-Making, Diversity Awareness
- Status: [object Object]
Skills you'll gain: Git (Version Control System), Software Development Methodologies, JUnit, Requirements Analysis, Application Development, Software Development Life Cycle, SQL, Full-Stack Web Development, Test Driven Development (TDD), Version Control, Restful API, Object Oriented Programming (OOP), Object Oriented Design, Database Management, Digital Transformation, Relational Databases, Java Programming, Generative AI, Java, Front-End Web Development
Amazon Web Services
Skills you'll gain: Amazon Web Services, Web Applications, Amazon Elastic Compute Cloud, Information Technology, Cloud Computing, Public Cloud, IT Infrastructure, Computer Systems, Amazon S3, Network Security, Web Servers, Operating Systems, Servers, Data Centers, Hypertext Markup Language (HTML), Computer Hardware, Javascript
The University of Melbourne
Skills you'll gain: Financial Analysis, Financial Statement Analysis, Financial Statements, Corporate Finance, Financial Accounting, Accounting, Financial Systems, Financial Modeling, Investments, Capital Markets, Market Liquidity, Financial Management, Balance Sheet, Derivatives, Financial Market, Income Statement, Business Valuation, International Finance, Mergers & Acquisitions, Capital Budgeting
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Server Side, Vulnerability Assessments
- Status: Free
UNSW Sydney (The University of New South Wales)
Skills you'll gain: Systems Engineering, Engineering Management, Conceptual Design, Systems Design, Requirements Analysis, Systems Development Life Cycle, Requirements Elicitation, Systems Architecture, Systems Integration, System Design and Implementation, Technical Design, Configuration Management, Prototyping, Verification And Validation
Palo Alto Networks
Skills you'll gain: Cyber Operations, Endpoint Detection and Response, Endpoint Security, Security Information and Event Management (SIEM), Zero Trust Network Access, Cybersecurity, Cyber Threat Intelligence, Threat Modeling, Continuous Monitoring, Security Controls, IT Security Architecture, Threat Detection, Incident Response, Malware Protection, Automation, Authentications, Data Lakes
DeepLearning.AI
Skills you'll gain: Software Documentation, Software Testing, Technical Documentation, Dependency Analysis, Software Development Tools, Debugging, Development Environment, Code Review, Maintainability, Generative AI, Software Engineering, Application Security, Artificial Intelligence
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Health Systems, Personally Identifiable Information, Health Care Procedure and Regulation, Law, Regulation, and Compliance, Information Privacy, Primary Care, Health Care Administration, Healthcare Industry Knowledge, Medicare, Health Care, Pharmaceuticals, Compliance Management, Systems Thinking, Data Security, Regulation and Legal Compliance, Governance, Incident Response, Regulatory Affairs, Policy Analysis
In summary, here are 10 of our most popular breach (security exploit) courses
- Cryptocurrency and Blockchain: An Introduction to Digital Currencies:Â University of Pennsylvania
- Cybersecurity Risk Management Framework:Â Infosec
- Data & Cybersecurity:Â Campus BBVA
- Data Science Ethics:Â University of Michigan
- Amazon Junior Software Developer:Â Amazon
- Introduction to Information Technology and AWS Cloud:Â Amazon Web Services
- Essentials of Corporate Finance:Â The University of Melbourne
- Software Security for Web Applications:Â Codio
- Introduction to Systems Engineering:Â UNSW Sydney (The University of New South Wales)
- Palo Alto Networks Security Operations Fundamentals:Â Palo Alto Networks