Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cybersecurity, Network Security, Cyber Security Strategy, System Monitoring, Cyber Operations, Threat Management, Continuous Monitoring, Cyber Threat Intelligence, Incident Response, Cyber Attacks, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Python Programming, Data Access, Intrusion Detection and Prevention
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Mobile Security, Cybersecurity, Cyber Threat Intelligence, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Intrusion Detection and Prevention, Encryption, Network Protocols
LearnKartS
Skills you'll gain: Salesforce, Business Process Automation, Process Design, Salesforce Development, Workflow Management, Business Process Improvement, Data Access, Automation, Authorization (Computing), Operational Efficiency, Data Sharing, Role-Based Access Control (RBAC), Data Security, Identity and Access Management, Application Security
The University of Melbourne
Skills you'll gain: Financial Analysis, Financial Statement Analysis, Financial Statements, Corporate Finance, Financial Accounting, Accounting, Financial Systems, Financial Modeling, Investments, Capital Markets, Market Liquidity, Financial Management, Balance Sheet, Derivatives, Financial Market, Income Statement, Business Valuation, International Finance, Mergers & Acquisitions, Capital Budgeting
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), Angular, OAuth, Test Driven Development (TDD), Cryptography, Data Validation, Unit Testing, Vue.JS, Data Security, Authentications, HTML and CSS, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Web Development, Software Testing, Web Applications, JavaScript Frameworks, Front-End Web Development
- Status: Free
Universiteit Leiden
Skills you'll gain: Risk Management, Business Risk Management, Operational Risk, Risk Analysis, Safety and Security, Environmental Issue, Public Safety and National Security, Cyber Security Strategy
Infosec
Skills you'll gain: Authentications, Application Security, Secure Coding, Serverless Computing, Cryptography, Risk Management Framework, Threat Modeling, Cloud Security, Infrastructure Security, Package and Software Management, Node.JS, Web Applications, Javascript, Vulnerability Management, Cloud Services, Cloud Platforms, Web Development, Identity and Access Management, Dependency Analysis, Vulnerability Assessments
Qualcomm Academy
Skills you'll gain: Wireless Networks, Emerging Technologies, Internet Of Things, General Networking, Digital Communications, Data Security, Technology Strategies, Network Planning And Design, Network Infrastructure, Virtualization
- Status: Free
Infosec
Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Information Systems Security, Application Security, Security Management, Computer Security Incident Management, Network Security, IT Security Architecture, Threat Management, Security Information and Event Management (SIEM), Security Controls, Identity and Access Management, Cryptography, Threat Detection, Cyber Security Policies, Data Security, Encryption, Security Strategy, Incident Management
University of Pennsylvania
Skills you'll gain: Blockchain, Cryptography, Digital Assets, Investments, Portfolio Management, Investment Management, FinTech, Asset Management, Financial Analysis, Financial Market, Emerging Technologies, Public Key Infrastructure, Finance, Payment Systems, Encryption, Return On Investment, Data Security, Data Integrity, Risk Analysis
Skills you'll gain: Cost Management, Quality Management, Backlogs, Project Closure, Project Planning, Sprint Retrospectives, Project Scoping, Team Leadership, Project Management Life Cycle, Agile Project Management, Communication Planning, Continuous Improvement Process, Process Improvement, Project Management Software, Project Management, Change Control, Project Controls, Agile Methodology, Requirements Analysis, Change Management
University of Minnesota
Skills you'll gain: Software Development Methodologies, Agile Methodology, Software Engineering, Software Development Life Cycle, Requirements Analysis, Application Deployment, Agile Software Development, Systems Development, Software Architecture, Verification And Validation, Software Development, Process Driven Development, Waterfall Methodology, Software Testing, Scrum (Software Development), Release Management, Development Testing, Maintainability
In summary, here are 10 of our most popular breach (security exploit) courses
- Python for Cybersecurity:Â Infosec
- Advanced Cybersecurity Techniques:Â Johns Hopkins University
- Security and Automation:Â LearnKartS
- Essentials of Corporate Finance:Â The University of Melbourne
- Web Technologies and Security:Â Codio
- Risk in Modern Society :Â Universiteit Leiden
- JavaScript Security:Â Infosec
- 5G for Everyone:Â Qualcomm Academy
- CompTIA Security+ 701:Â Infosec
- Cryptocurrency and Blockchain: An Introduction to Digital Currencies:Â University of Pennsylvania