Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
Columbia University
Skills you'll gain: Portfolio Management, Derivatives, Financial Market, Securities (Finance), Investment Management, Asset Management, Credit Risk, Mortgage Loans, Mathematical Modeling, Applied Mathematics, Capital Markets, Financial Modeling, Securities Trading, Regression Analysis, Market Liquidity, Futures Exchange, Risk Management, Equities, Finance, Market Data
University of Colorado Boulder
Skills you'll gain: Machine Learning Algorithms, Big Data, Internet Of Things, Analytics, File Systems, Embedded Systems, Debugging, Data Analysis, Machine Learning, Data Processing, Supervised Learning, IBM Cloud, Wireless Networks, Systems Engineering, Cloud Platforms, Computer Networking, Technical Communication, Network Protocols, Automation, Simulations
- Status: Free
The University of North Carolina at Chapel Hill
Skills you'll gain: Data Sharing, Data Management, File Management, Data Storage, Information Management, Metadata Management, Data Governance, Record Keeping, Data Security, Data Ethics, Information Privacy, Version Control
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Cyber Operations, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Threat Management
University of California, Irvine
Skills you'll gain: Swift Programming, Objective-C (Programming Language), iOS Development, Core Data (Software), Apple iOS, Apple Xcode, Model View Controller, JSON, User Interface (UI) Design, UI Components, User Interface and User Experience (UI/UX) Design, OAuth, Responsive Web Design, Prototyping, Human Computer Interaction, UI/UX Strategy, Usability Testing, Authentications, Data Mapping, Mobile Development
LearnQuest
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Security Strategy, Cloud Security, Disaster Recovery, Threat Management, Firewall, Network Security, Cybersecurity, Cloud Services, Security Information and Event Management (SIEM), Network Monitoring, Security Controls, Cloud Computing Architecture, Infrastructure Security
Skills you'll gain: OSI Models, Vulnerability Scanning, Penetration Testing, TCP/IP, General Networking, Network Security, Network Protocols, Network Monitoring, Cyber Security Assessment, Network Administration, Vulnerability Assessments, Computer Networking, Network Analysis, Firewall, Scripting, Performance Tuning, System Configuration, Software Installation
Google Cloud
Skills you'll gain: Cyber Operations, Security Management, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Threat Management, DevOps, Threat Detection, Cyber Security Assessment, Incident Response, Site Reliability Engineering, Digital Transformation, Agile Methodology, Automation
University of Colorado System
Skills you'll gain: Digital Communications, OSI Models, Network Protocols, TCP/IP, Network Routing, Network Architecture, Network Planning And Design, General Networking, Computer Networking, System Programming, Data Integrity
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability
Skills you'll gain: Network Troubleshooting, Hardware Troubleshooting, Command-Line Interface, Desktop Support, Operating Systems, Network Administration, System Support, System Configuration, Computer Hardware, Network Security, Microsoft Windows, Technical Support and Services, General Networking, Technical Support, Mac OS, Linux, Mobile Security, Infrastructure Security, Computer Displays, Firewall
University of Michigan
Skills you'll gain: PHP (Scripting Language), MySQL, Database Application, Database Development, Object Oriented Programming (OOP), Application Development, Back-End Web Development, Authentications, Web Applications, SQL, Server Side, Application Security, Model View Controller, Data Validation
In summary, here are 10 of our most popular breach (security exploit) courses
- Financial Engineering and Risk Management:Â Columbia University
- Developing Industrial Internet of Things:Â University of Colorado Boulder
- Research Data Management and Sharing:Â The University of North Carolina at Chapel Hill
- In the Trenches: Security Operations Center :Â EC-Council
- iOS Development for Creative Entrepreneurs:Â University of California, Irvine
- Advanced Network Security:Â LearnQuest
- Nmap for Penetration Testing: From Beginner to Advanced:Â Packt
- Modern Security Operations:Â Google Cloud
- Fundamentals of Network Communication:Â University of Colorado System
- Introduction to Applied Cryptography:Â University of Colorado System