Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
University of Colorado Boulder
Skills you'll gain: Machine Learning Algorithms, Big Data, Internet Of Things, Analytics, File Systems, Embedded Systems, Debugging, Data Analysis, Machine Learning, Data Processing, Supervised Learning, IBM Cloud, Wireless Networks, Systems Engineering, Cloud Platforms, Computer Networking, Technical Communication, Network Protocols, Automation, Simulations
LearnQuest
Skills you'll gain: Package and Software Management, Linux Administration, Linux, Linux Commands, Virtual Private Networks (VPN), Linux Servers, System Monitoring, Public Key Infrastructure, File Management, Command-Line Interface, Intrusion Detection and Prevention, Git (Version Control System), File Systems, User Accounts, Firewall, Remote Access Systems, Cloud Computing Architecture, DevOps, Virtualization, Cloud Computing
Amazon Web Services
Skills you'll gain: Descriptive Analytics, Analytics, Data Analysis, Dashboard, AWS Identity and Access Management (IAM), Data Visualization, Amazon Web Services, Exploratory Data Analysis, Amazon S3, Business Intelligence, Cloud Computing, Cloud Security
University of Illinois Urbana-Champaign
Skills you'll gain: Internet Of Things, Networking Hardware, Network Infrastructure, Network Routers, General Networking, Network Switches, Network Protocols, Network Architecture, Wireless Networks, Network Administration, Infrastructure Security, Local Area Networks, Computer Networking, Emerging Technologies, Data Science, Embedded Systems, Network Planning And Design, Network Security, Distributed Computing, Digital Communications
Skills you'll gain: Oracle Cloud, Identity and Access Management, Oracle Databases, Cloud Infrastructure, Cloud Computing Architecture, Cloud Services, Cloud Security, Cloud Computing, Infrastructure As A Service (IaaS), Computing Platforms, Data Storage, Cloud Storage, Application Security, Data Security
ESSEC Business School
Skills you'll gain: Marketing Analytics, Customer Analysis, Advanced Analytics, Business Analytics, Market Research, Customer Insights, R Programming, Data-Driven Decision-Making, Target Market, Data Analysis, Statistical Analysis, Predictive Modeling, Customer Relationship Management, Consumer Behaviour, Statistical Methods, SQL, Probability & Statistics
Skills you'll gain: Malware Protection, Cyber Threat Hunting, Application Security, Cybersecurity, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Windows PowerShell, Virtualization, Operating Systems, Programming Principles, Computer Architecture, Linux
- Status: Free
Infosec
Skills you'll gain: Artificial Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Data Ethics, Governance, Information Assurance, Law, Regulation, and Compliance, Information Privacy, Regulatory Compliance, Generative AI, Machine Learning, Ethical Standards And Conduct, Risk Management
- Status: Free
The University of North Carolina at Chapel Hill
Skills you'll gain: Data Sharing, Data Management, File Management, Data Storage, Information Management, Metadata Management, Data Governance, Record Keeping, Data Security, Data Ethics, Information Privacy, Version Control
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, Application Security, IT Security Architecture, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
Google
Skills you'll gain: Threat Modeling, Security Controls, Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Vulnerability Management, Cybersecurity, Hardening, Network Security, Stakeholder Communications, Vulnerability Assessments, Relational Databases, Security Information and Event Management (SIEM), TCP/IP, Data Security, Cloud Security, Network Architecture, Linux, Debugging, Cyber Risk
Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment, Penetration Testing, Network Security, Security Testing, Network Monitoring, Software Installation, System Configuration, Microsoft Windows, Linux, Integration Testing, Operating Systems
In summary, here are 10 of our most popular breach (security exploit) courses
- Developing Industrial Internet of Things: University of Colorado Boulder
- Learning Linux for LFCA Certification: LearnQuest
- Getting Started with Data Analytics on AWS: Amazon Web Services
- Hands-on Internet of Things: University of Illinois Urbana-Champaign
- Oracle Cloud Infrastructure Foundations: Oracle
- Foundations of marketing analytics: ESSEC Business School
- Malware Analysis and Introduction to Assembly Language: IBM
- AI Security: Infosec
- Research Data Management and Sharing: The University of North Carolina at Chapel Hill
- Cyber Security Technologies: Illinois Tech