Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
University of Michigan
Skills you'll gain: Data Ethics, Information Privacy, Personally Identifiable Information, Data Security, Data Governance, Ethical Standards And Conduct, Big Data, Law, Regulation, and Compliance, Data Analysis, Social Sciences, Data-Driven Decision-Making, Diversity Awareness
Skills you'll gain: Supply Chain, Demand Planning, Supply Chain Management, Supply Chain Planning, Process Improvement, Transportation, Supply Chain, and Logistics, Logistics Management, Supplier Management, Analytics, Corporate Sustainability, Scheduling, Inventory Management System, Forecasting, Security Management, Risk Management
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability
Skills you'll gain: ISO/IEC 27001, Risk Management, Personally Identifiable Information, Business Risk Management, Security Controls, System Implementation, Information Privacy, Security Management, Security Strategy
Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Cloud Services, Cloud Platforms, General Networking, Windows PowerShell, Cyber Governance, Unix Commands, Cyber Security Strategy
- Status: Free
The University of North Carolina at Chapel Hill
Skills you'll gain: Data Sharing, Data Management, File Management, Data Storage, Information Management, Metadata Management, Data Governance, Record Keeping, Data Security, Data Ethics, Information Privacy, Version Control
University at Buffalo
Skills you'll gain: Digital Transformation, Manufacturing Processes, Manufacturing Operations, Industrial Engineering, Business Transformation, Product Design, Digital Design, Data-Driven Decision-Making, Process Improvement and Optimization, Market Dynamics, Safety and Security, Workforce Development
Skills you'll gain: Google Cloud Platform, Amazon Web Services, Virtual Private Networks (VPN), Identity and Access Management, Cloud Infrastructure, Cloud Computing Architecture, Virtual Local Area Network (VLAN), General Networking, Network Routing, Firewall, Wide Area Networks, User Accounts
Skills you'll gain: Cybersecurity, Security Controls, Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, Security Management, Data Access, Enterprise Security, Authentications
- Status: Free
UNSW Sydney (The University of New South Wales)
Skills you'll gain: Systems Engineering, Engineering Management, Conceptual Design, Systems Design, Requirements Analysis, Systems Development Life Cycle, Requirements Elicitation, Systems Architecture, Systems Integration, System Design and Implementation, Technical Design, Configuration Management, Prototyping, Verification And Validation
- Status: Free
Northeastern University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Ethics, Law, Regulation, and Compliance, Data Security, Journalism, Emerging Technologies, Digital Communications, Data Collection, Internet Of Things, Machine Learning, Artificial Intelligence
- Status: Free
University of Pittsburgh
Skills you'll gain: Triage, Mitigation, Business Continuity Planning, Emergency Response, Safety and Security, Public Safety and National Security, Resilience, Emergency Medicine, First Aid, Risk Management, Cultural Diversity
In summary, here are 10 of our most popular breach (security exploit) courses
- Data Science Ethics:Â University of Michigan
- Supply Chain Management and Analytics:Â Unilever
- Introduction to Applied Cryptography:Â University of Colorado System
- Understanding ISO Security Standards for Your Organization:Â Codio
- Cybersecurity Foundations:Â Infosec
- Research Data Management and Sharing:Â The University of North Carolina at Chapel Hill
- Digital Manufacturing & Design:Â University at Buffalo
- Google Cloud IAM and Networking for AWS Professionals:Â Google Cloud
- Access Control Concepts:Â ISC2
- Introduction to Systems Engineering:Â UNSW Sydney (The University of New South Wales)