Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
University of Pennsylvania
Skills you'll gain: Blockchain, Cryptography, Digital Assets, Investments, Portfolio Management, Investment Management, FinTech, Asset Management, Financial Analysis, Financial Market, Emerging Technologies, Public Key Infrastructure, Finance, Payment Systems, Encryption, Return On Investment, Data Security, Data Integrity, Risk Analysis
Skills you'll gain: Virtualization, Unix, IBM DB2, IBM Cloud, Data Management, Virtual Machines, Database Management Systems, Data Storage, Infrastructure Architecture, System Programming, Operating Systems, Unix Commands, IT Infrastructure, System Monitoring, File Systems, Computer Architecture, Servers, Control Panels, Command-Line Interface, Computing Platforms
Skills you'll gain: NIST 800-53, Risk Management Framework, Cyber Risk, Federal Information Security Management Act, Cybersecurity, Risk Management, Security Management, Cyber Governance, Cyber Security Strategy, Operational Risk, Governance Risk Management and Compliance, Security Controls, Continuous Monitoring, Infrastructure Security, Cyber Security Assessment, Enterprise Risk Management (ERM), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
University of Michigan
Skills you'll gain: Data Ethics, Information Privacy, Personally Identifiable Information, Data Security, Data Governance, Ethical Standards And Conduct, Big Data, Law, Regulation, and Compliance, Data Analysis, Social Sciences, Data-Driven Decision-Making, Diversity Awareness
University of Alberta
Skills you'll gain: Requirements Analysis, Requirements Elicitation, Requirements Management, Functional Requirement, Business Requirements, Product Requirements, Backlogs, User Requirements Documents, Scope Management, Change Control, User Story, System Requirements, Project Scoping, Product Roadmaps, Client Services, Agile Methodology, Prioritization
- Status: Free
Campus BBVA
Skills you'll gain: Incident Management, Crisis Management, Security Information and Event Management (SIEM), Data Security, Cybersecurity, Cyber Attacks, Security Strategy, Information Systems Security, Cyber Operations, Information Assurance, Data Processing, Security Awareness, Network Security, Anomaly Detection, Data Science, Time Series Analysis and Forecasting, Unsupervised Learning
- Status: Free
UNSW Sydney (The University of New South Wales)
Skills you'll gain: Systems Engineering, Engineering Management, Conceptual Design, Systems Design, Requirements Analysis, Systems Development Life Cycle, Requirements Elicitation, Systems Architecture, Systems Integration, System Design and Implementation, Technical Design, Configuration Management, Prototyping, Verification And Validation
University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Server Administration, Authorization (Computing), Network Administration, Information Systems Security, Authentications
The University of Melbourne
Skills you'll gain: Financial Analysis, Financial Statement Analysis, Financial Statements, Corporate Finance, Financial Accounting, Accounting, Financial Systems, Financial Modeling, Investments, Capital Markets, Market Liquidity, Financial Management, Balance Sheet, Derivatives, Financial Market, Income Statement, Business Valuation, International Finance, Mergers & Acquisitions, Capital Budgeting
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Computer Security, Security Controls, Vulnerability Assessments, Identity and Access Management
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Server Side, Vulnerability Assessments
- Status: [object Object]
Skills you'll gain: Git (Version Control System), Software Development Methodologies, JUnit, Requirements Analysis, Application Development, Software Development Life Cycle, SQL, Full-Stack Web Development, Test Driven Development (TDD), Version Control, Restful API, Object Oriented Programming (OOP), Object Oriented Design, Database Management, Digital Transformation, Relational Databases, Java Programming, Generative AI, Java, Front-End Web Development
In summary, here are 10 of our most popular breach (security exploit) courses
- Cryptocurrency and Blockchain: An Introduction to Digital Currencies:Â University of Pennsylvania
- IBM z/OS Mainframe Practitioner:Â IBM
- Cybersecurity Risk Management Framework:Â Infosec
- Data Science Ethics:Â University of Michigan
- Client Needs and Software Requirements :Â University of Alberta
- Data & Cybersecurity:Â Campus BBVA
- Introduction to Systems Engineering:Â UNSW Sydney (The University of New South Wales)
- Linux Server Management and Security:Â University of Colorado System
- Essentials of Corporate Finance:Â The University of Melbourne
- Advanced Cybersecurity Concepts and Capstone Project:Â Microsoft