Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
DeepLearning.AI
Skills you'll gain: Database Design, Software Documentation, Software Design Patterns, Database Systems, Software Testing, ChatGPT, Technical Documentation, Generative AI, Software Design, Code Review, Software Architecture, Software Systems, System Design and Implementation, Dependency Analysis, Artificial Intelligence, Software Development Tools, OpenAI, Software Development, Natural Language Processing, Debugging
LearnQuest
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Security Strategy, Cloud Security, Disaster Recovery, Threat Management, Firewall, Network Security, Cybersecurity, Cloud Services, Security Information and Event Management (SIEM), Network Monitoring, Security Controls, Cloud Computing Architecture, Infrastructure Security
- Status: Free
Skills you'll gain: Cloud Computing Architecture, Cloud Security, Cloud Infrastructure, Cloud Computing, Cloud Applications, IT Security Architecture, Cloud Services, Infrastructure Security, Application Security, Data Security, Cybersecurity, Security Controls, Risk Management Framework, Encryption
University of Colorado Boulder
Skills you'll gain: Machine Learning Algorithms, Big Data, Internet Of Things, Analytics, File Systems, Embedded Systems, Debugging, Data Analysis, Machine Learning, Data Processing, Supervised Learning, IBM Cloud, Wireless Networks, Systems Engineering, Cloud Platforms, Computer Networking, Technical Communication, Network Protocols, Automation, Simulations
Board Infinity
Skills you'll gain: Vulnerability Assessments, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Cyber Security Assessment, Linux Commands, Cybersecurity, Linux, Network Security, Intrusion Detection and Prevention, Software Installation, Network Analysis
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Cyber Operations, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Threat Management
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Human Factors (Security), Threat Management, Security Awareness, Cybersecurity, Cyber Risk, Cyber Attacks, Security Strategy, Compliance Training, Employee Training
Skills you'll gain: Penetration Testing, Security Testing, Open Web Application Security Project (OWASP), Application Security, Test Tools, Vulnerability Assessments, Web Development Tools, Cybersecurity, Web Applications, SQL
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Personally Identifiable Information, Law, Regulation, and Compliance, Information Privacy, Compliance Management, Health Care Procedure and Regulation, Data Security, Incident Response, Risk Analysis, Governance
University of Colorado System
Skills you'll gain: Digital Communications, OSI Models, Network Protocols, TCP/IP, Network Routing, Network Architecture, Network Planning And Design, General Networking, Computer Networking, System Programming, Data Integrity
Skills you'll gain: Authentications, Secure Coding, Cryptography, Application Security, Web Applications, Javascript, Identity and Access Management, Cybersecurity, Node.JS, Front-End Web Development
- Status: Free
The University of Chicago
Skills you'll gain: Software-Defined Networking, Computer Networking, Virtualization, Network Architecture, Network Administration, Network Switches, Network Routing, Network Security, Wide Area Networks, Data Centers, Application Programming Interface (API), Scalability
In summary, here are 10 of our most popular breach (security exploit) courses
- Generative AI for Software Development:Â DeepLearning.AI
- Advanced Network Security:Â LearnQuest
- Certified Cloud Security Professional (CCSP):Â Infosec
- Developing Industrial Internet of Things:Â University of Colorado Boulder
- Kali Linux:Â Board Infinity
- In the Trenches: Security Operations Center :Â EC-Council
- Cybersecurity and the X-Factor:Â Kennesaw State University
- Web Hacker's Toolbox - Tools Used by Successful Hackers:Â Packt
- Privacy Law and HIPAA:Â University of Pennsylvania
- Fundamentals of Network Communication:Â University of Colorado System