Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, HTML and CSS, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Responsive Web Design, Hypertext Markup Language (HTML), Application Development, TCP/IP, Scripting, MySQL
LearnQuest
Skills you'll gain: Network Monitoring, Network Administration, Network Security, Routing Protocols, Network Troubleshooting, OSI Models, TCP/IP, Computer Networking, Network Routers, Network Switches, General Networking, Command-Line Interface, Networking Hardware, Network Architecture, Local Area Networks, Network Infrastructure, Cybersecurity, Network Protocols
- Status: Free
Yale University
Skills you'll gain: Contract Review, Contract Management, Contract Compliance, Law, Regulation, and Compliance, Policy Analysis, Mitigation
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Software Design, Programming Principles, Debugging, Program Development, C (Programming Language), Software Development Methodologies
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Human Factors (Security), Threat Management, Security Awareness, Cybersecurity, Cyber Risk, Cyber Attacks, Security Strategy, Compliance Training, Employee Training
Cisco Learning and Certifications
Skills you'll gain: File Systems, Endpoint Security, Linux, Microsoft Windows, Windows PowerShell, Linux Administration, Windows Servers, Operating Systems, Linux Commands, Network Administration, Active Directory, System Monitoring, System Configuration, OS Process Management, Network Security, Security Controls, Command-Line Interface, Systems Administration
Infosec
Skills you'll gain: File Systems, Criminal Investigation and Forensics, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, File Management, Operating Systems, Data Structures, Data Ethics, General Networking, Data Validation, Record Keeping, Data Storage Technologies, Data Integrity, Data Analysis Software, User Accounts, USB, Systems Analysis
- Status: Free
EIT Digital
Skills you'll gain: Embedded Software, Embedded Systems, Systems Architecture, Debugging, Computer Architecture, System Programming, Internet Of Things, Application Security, General Networking, Wireless Networks, Operating Systems, Performance Tuning, System Configuration, Hardware Troubleshooting, Real Time Data
Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, Cyber Security Assessment, General Networking, Network Security, Cybersecurity, Vulnerability Scanning, Vulnerability Assessments, Data Ethics, System Configuration, Software Installation, Virtual Machines
University of Minnesota
Skills you'll gain: Software Development Methodologies, Agile Methodology, Software Engineering, Software Development Life Cycle, Requirements Analysis, Application Deployment, Agile Software Development, Systems Development, Software Architecture, Verification And Validation, Software Development, Process Driven Development, Waterfall Methodology, Software Testing, Scrum (Software Development), Release Management, Development Testing, Maintainability
Skills you'll gain: Kubernetes, Cloud-Native Computing, Google Cloud Platform, Application Deployment, Scalability, Load Balancing, Cloud Infrastructure, Containerization, Cloud Computing, YAML, Data Storage, Authorization (Computing), General Networking, Network Security
- Status: Free
The University of Sydney
Skills you'll gain: Blockchain, Distributed Computing, Security Engineering, Network Security, Scalability, Cryptography, Data Integrity, Transaction Processing, Algorithms, Network Model, Theoretical Computer Science
In summary, here are 10 of our most popular breach (security exploit) courses
- Akamai Customer Consulting and Support:Â Akamai Technologies, Inc.
- Basics of Cisco Networking:Â LearnQuest
- American Contract Law II:Â Yale University
- Principles of Secure Coding:Â University of California, Davis
- Cybersecurity and the X-Factor:Â Kennesaw State University
- Endpoints and Systems:Â Cisco Learning and Certifications
- Computer Forensics:Â Infosec
- Architecting Smart IoT Devices:Â EIT Digital
- Ethical Hacking Foundations:Â Packt
- Software Development Processes and Methodologies:Â University of Minnesota