Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Cloud Services, Cloud Platforms, General Networking, Windows PowerShell, Cyber Governance, Unix Commands, Cyber Security Strategy
Columbia University
Skills you'll gain: Portfolio Management, Derivatives, Financial Market, Securities (Finance), Investment Management, Asset Management, Credit Risk, Mortgage Loans, Mathematical Modeling, Applied Mathematics, Capital Markets, Financial Modeling, Securities Trading, Regression Analysis, Market Liquidity, Futures Exchange, Risk Management, Equities, Finance, Market Data
University of Colorado Boulder
Skills you'll gain: Machine Learning Algorithms, Big Data, Internet Of Things, Analytics, File Systems, Embedded Systems, Debugging, Data Analysis, Machine Learning, Data Processing, Supervised Learning, IBM Cloud, Wireless Networks, Systems Engineering, Cloud Platforms, Computer Networking, Technical Communication, Network Protocols, Automation, Simulations
- Status: Free
The University of North Carolina at Chapel Hill
Skills you'll gain: Data Sharing, Data Management, File Management, Data Storage, Information Management, Metadata Management, Data Governance, Record Keeping, Data Security, Data Ethics, Information Privacy, Version Control
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Mobile Security, Cybersecurity, Threat Modeling, Penetration Testing, Cyber Threat Intelligence, Open Web Application Security Project (OWASP), Malware Protection, Threat Detection, Network Security, MITRE ATT&CK Framework, Cyber Attacks, Intrusion Detection and Prevention, Information Systems Security, Wireless Networks, Cryptography, Risk Management Framework, Encryption
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Cyber Operations, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Threat Management
University of California, Irvine
Skills you'll gain: Swift Programming, Objective-C (Programming Language), iOS Development, Core Data (Software), Apple iOS, Apple Xcode, Model View Controller, JSON, User Interface (UI) Design, UI Components, User Interface and User Experience (UI/UX) Design, OAuth, Responsive Web Design, Prototyping, Human Computer Interaction, UI/UX Strategy, Usability Testing, Authentications, Data Mapping, Mobile Development
LearnQuest
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Security Strategy, Cloud Security, Disaster Recovery, Threat Management, Firewall, Network Security, Cybersecurity, Cloud Services, Security Information and Event Management (SIEM), Network Monitoring, Security Controls, Cloud Computing Architecture, Infrastructure Security
Skills you'll gain: OSI Models, Vulnerability Scanning, Penetration Testing, TCP/IP, General Networking, Network Security, Network Protocols, Network Monitoring, Cyber Security Assessment, Network Administration, Vulnerability Assessments, Computer Networking, Network Analysis, Firewall, Scripting, Performance Tuning, System Configuration, Software Installation
Google Cloud
Skills you'll gain: Cyber Operations, Security Management, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Threat Management, DevOps, Threat Detection, Cyber Security Assessment, Incident Response, Site Reliability Engineering, Digital Transformation, Agile Methodology, Automation
University of Colorado System
Skills you'll gain: Digital Communications, OSI Models, Network Protocols, TCP/IP, Network Routing, Network Architecture, Network Planning And Design, General Networking, Computer Networking, System Programming, Data Integrity
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability
In summary, here are 10 of our most popular breach (security exploit) courses
- Cybersecurity Foundations:Â Infosec
- Financial Engineering and Risk Management:Â Columbia University
- Developing Industrial Internet of Things:Â University of Colorado Boulder
- Research Data Management and Sharing:Â The University of North Carolina at Chapel Hill
- Certified Ethical Hacker (CEH) v.12:Â Packt
- In the Trenches: Security Operations Center :Â EC-Council
- iOS Development for Creative Entrepreneurs:Â University of California, Irvine
- Advanced Network Security:Â LearnQuest
- Nmap for Penetration Testing: From Beginner to Advanced:Â Packt
- Modern Security Operations:Â Google Cloud