Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
Skills you'll gain: Data Governance, Descriptive Analytics, Data Storytelling, Supply Chain, Data Presentation, Supply Chain Management, Demand Planning, Presentations, Data Visualization, Supply Chain Systems, Supply Chain Planning, Transportation, Supply Chain, and Logistics, Process Improvement, Data Management, Data Lakes, Predictive Analytics, Forecasting, Data Analysis, Data Analysis Software, Real Time Data
Google Cloud
Skills you'll gain: Digital Transformation, Cloud Services, Cloud Infrastructure, Infrastructure As A Service (IaaS), Cloud Computing, Public Cloud, Business Transformation, Google Cloud Platform, Software As A Service, Platform As A Service (PaaS), Hybrid Cloud Computing, Cloud Security, Multi-Cloud, Capital Expenditure, Operating Expense
Skills you'll gain: Revenue Cycle Management, Medical Records, Electronic Medical Record, Health Care Procedure and Regulation, Health Information Management and Medical Records, Medical Office Procedures, Billing, Billing & Invoicing, Healthcare Industry Knowledge, Patient Registration, Practice Management Software, Medicare, Health Care, Regulatory Compliance, Medical Terminology, Data Entry, Information Privacy, Data Security
Automatic Data Processing, Inc. (ADP)
Skills you'll gain: Payroll, Payroll Processing, Payroll Systems, Payroll Administration, Payroll Tax, Payroll Reporting, Compensation Strategy, Data Entry, Employee Onboarding, Labor Law, Human Resource Strategy, Compensation Management, Compensation and Benefits, Non-Profit Accounting, Tax Preparation, Tax Compliance, Human Resources, Benefits Administration, Specialized Accounting, Record Keeping
Skills you'll gain: Azure Active Directory, Authentications, Identity and Access Management, Authorization (Computing), Active Directory, Role-Based Access Control (RBAC), Multi-Factor Authentication, Single Sign-On (SSO), Software As A Service, User Accounts
- Status: Free
Campus BBVA
Skills you'll gain: Computer Security Incident Management, Cyber Attacks, Cybersecurity, Threat Management, Security Awareness, Cyber Risk, Email Security, Data Security, Network Security, Business Process, Mobile Security, Multi-Factor Authentication
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Software Testing, Selenium (Software), Gherkin (Scripting Language), JUnit, Verification And Validation, Test Automation, Unit Testing, Security Testing, Regression Testing, Test Case, Software Development Tools, Testability, Behavior-Driven Development, Code Coverage, Performance Testing, Development Testing, Software Engineering Tools, Test Planning, Acceptance Testing
Skills you'll gain: OSI Models, Network Security, Security Controls, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Proxy Servers, Distributed Denial-Of-Service (DDoS) Attacks, Network Infrastructure, Network Architecture, Network Monitoring, Authentications, Identity and Access Management
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Security Controls, Security Testing, Virtual Machines, Application Security, Technical Documentation, Data Security, Web Servers, Linux
Skills you'll gain: Application Deployment, Cloud Infrastructure, CI/CD, Cloud Security, Service Level Agreement, Microservices, Service Level, Google Cloud Platform, Network Architecture, API Design, Site Reliability Engineering, Cloud Computing Architecture, Kubernetes, Restful API, Infrastructure Architecture, Cloud Storage, Cloud Applications, Key Performance Indicators (KPIs), DevOps, Data Storage
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Public Key Infrastructure, Threat Modeling, Cryptography, Security Testing, Cyber Threat Intelligence, Mobile Security, Cybersecurity, Application Security, Vulnerability Assessments, Network Security, Threat Detection, Encryption, Operating Systems, Web Applications, Malware Protection, Technical Writing, Information Systems Security, Wireless Networks
University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Server Administration, Authorization (Computing), Network Administration, Information Systems Security, Authentications
In summary, here are 10 of our most popular breach (security exploit) courses
- Unilever Supply Chain Data Analyst:Â Unilever
- Digital Transformation with Google Cloud:Â Google Cloud
- Medical Billing and Coding Essentials:Â MedCerts
- ADP Entry-Level Payroll Specialist:Â Automatic Data Processing, Inc. (ADP)
- Cybersecurity Identity and Access Solutions using Azure AD:Â Microsoft
- Cybersecurity for Managers:Â Campus BBVA
- Software Testing and Automation:Â University of Minnesota
- Network and Communications Security :Â ISC2
- Offensive Hacking Unfolded - Become a Pro Pentester:Â Packt
- Reliable Google Cloud Infrastructure: Design and Process:Â Google Cloud