Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
Skills you'll gain: Django (Web Framework), Web Development, Web Servers, Web Applications, Data Modeling, MySQL, Application Security, Database Development, Object-Relational Mapping, Application Frameworks, Database Management, HTML and CSS, Restful API, Debugging
Duke University
Skills you'll gain: Loans, Blockchain, FinTech, Lending and Underwriting, Operational Risk, Scalability, Security Testing, Interoperability, Payment Systems, General Lending, Risk Management, Consumer Lending, Derivatives, Key Management, Credit Risk, Cryptography, Emerging Technologies, Financial Regulations, Digital Assets, Financial Systems
Skills you'll gain: Secure Coding, Full-Stack Web Development, Penetration Testing, Application Security, Web Applications, Security Testing, Web Development, Angular, Web Development Tools, Vulnerability Assessments, Cybersecurity, Ajax, Javascript
University of Alberta
Skills you'll gain: Requirements Analysis, Requirements Elicitation, Requirements Management, Functional Requirement, Business Requirements, Product Requirements, Backlogs, User Requirements Documents, Scope Management, Change Control, User Story, System Requirements, Project Scoping, Product Roadmaps, Client Services, Agile Methodology, Prioritization
Google Cloud
Skills you'll gain: Digital Transformation, Cloud Services, Cloud Infrastructure, Infrastructure As A Service (IaaS), Cloud Computing, Public Cloud, Business Transformation, Google Cloud Platform, Software As A Service, Platform As A Service (PaaS), Hybrid Cloud Computing, Cloud Security, Multi-Cloud, Capital Expenditure, Operating Expense
Skills you'll gain: Cryptography, Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Threat Modeling, Simple Object Access Protocol (SOAP), TCP/IP, Web Applications, Restful API
Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, Threat Management, System Testing, Threat Detection, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface
Google
Skills you'll gain: Computer Networking, IT Infrastructure, Network Troubleshooting, OSI Models, Systems Administration, Network Security, Routing Protocols, Cybersecurity, Microsoft Windows, Cyber Attacks, Security Strategy, File Systems, Disaster Recovery, Lightweight Directory Access Protocols, Remote Access Systems, Linux, Technical Support, Help Desk Support, Information Technology, Software Installation
University of Colorado System
Skills you'll gain: Cryptography, Cryptographic Protocols, Encryption, Information Systems Security, Cybersecurity, Computer Security, Theoretical Computer Science
- Status: [object Object]
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Cloud Management, Microsoft Azure, Business Software, Computer Hardware, Virtual Machines, Identity and Access Management, Cybersecurity, Network Troubleshooting, Desktop Support, Virtual Private Networks (VPN), Azure Active Directory, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, System Monitoring, Virtualization and Virtual Machines, Disaster Recovery
- Status: Free
Coursera Project Network
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Real Time Data, Network Analysis
University of Colorado System
Skills you'll gain: TCP/IP, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Routing, Computer Networking, Software-Defined Networking, Virtualization
In summary, here are 10 of our most popular breach (security exploit) courses
- Django Web Framework :Â Meta
- Decentralized Finance (DeFi): The Future of Finance:Â Duke University
- Web Hacking Expert - Full-Stack Exploitation Mastery:Â Packt
- Client Needs and Software Requirements :Â University of Alberta
- Digital Transformation with Google Cloud:Â Google Cloud
- Web Connectivity and Security in Embedded Systems:Â EIT Digital
- Cybersecurity Testing and Prevention:Â Microsoft
- IT Support Google:Â Google
- Cryptography and Information Theory:Â University of Colorado System
- Microsoft Cloud Support Associate:Â Microsoft