Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability & penetration testing"
Michigan State University
Skills you'll gain: Value Propositions, Business Planning, Business Modeling, Entrepreneurship, Verification And Validation, Business Development, Business Strategy, Product Development, Financial Forecasting, New Business Development, Financial Analysis, Customer Analysis, Innovation
Johns Hopkins University
Skills you'll gain: Artificial Neural Networks, Image Analysis, Event-Driven Programming, C and C++, Scalability, Applied Machine Learning, Deep Learning, Natural Language Processing, Artificial Intelligence and Machine Learning (AI/ML), Performance Tuning, Linear Algebra, Distributed Computing, Computer Hardware, Mathematical Software, Computer Vision, Computer Architecture, Computer Systems, Data Structures, Performance Testing, System Programming
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
Microsoft
Skills you'll gain: Unsupervised Learning, Generative AI, Data Management, Natural Language Processing, MLOps (Machine Learning Operations), Supervised Learning, Microsoft Azure, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Infrastructure Architecture, Data Infrastructure, Applied Machine Learning, Reinforcement Learning, Data Ethics, Artificial Intelligence, Test Case, OpenAI, Human Computer Interaction, Performance Testing, Application Deployment
Skills you'll gain: Exploratory Data Analysis, Data Compilation, Correlation Analysis, Data Collection, Statistical Inference, Statistical Process Controls, Statistical Methods, Predictive Modeling, Data Analysis, Statistical Hypothesis Testing, Data-Driven Decision-Making, Regression Analysis, Statistical Analysis, Experimentation, Probability & Statistics, Descriptive Statistics, Interactive Data Visualization
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Vulnerability Scanning, Encryption, Key Management, Virtual Machines
Skills you'll gain: Shiny (R Package), Data Presentation, Exploratory Data Analysis, Data Wrangling, Predictive Modeling, Tidyverse (R Package), Data Science, Data Collection, Data Storytelling, Interactive Data Visualization, Data Manipulation, Dashboard, Data Analysis, Data Cleansing, Statistical Modeling, R Programming, Regression Analysis, Ggplot2, Data Visualization Software, Web Scraping
Skills you'll gain: User Experience Design, Web Content Accessibility Guidelines, User Centered Design, Figma (Design Software), Design, Visual Design, Usability Testing, Prototyping, Graphic and Visual Design, Design Elements And Principles, Artificial Intelligence
EIT Digital
Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Management, Data Access, Vulnerability Assessments, Encryption, Information Privacy, Data Management, Big Data, Authorization (Computing)
University of Colorado Boulder
Skills you'll gain: Embedded Software, Embedded Systems, Debugging, Failure Analysis, Technical Communication, Simulations, System Design and Implementation, Scenario Testing, Computer Programming Tools
Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Cyber Threat Intelligence, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Risk Management, Security Awareness, Information Systems Security, Cyber Operations, Cyber Security Policies, Incident Response, Computer Security Incident Management, Network Security, Risk Analysis
- Status: Free
Skills you'll gain: Verification And Validation, Theoretical Computer Science, System Testing, Embedded Software, System Software, Software Architecture, System Design and Implementation
In summary, here are 10 of our most popular vulnerability & penetration testing courses
- Planning: Principled, Proposing, Proofing, and Practicing to a Success Plan:Â Michigan State University
- GPU Programming:Â Johns Hopkins University
- ISC2 Systems Security Certified Practitioner (SSCP):Â ISC2
- Microsoft AI & ML Engineering:Â Microsoft
- Statistical Thinking for Industrial Problem Solving, presented by JMP:Â SAS
- Security Best Practices in Google Cloud:Â Google Cloud
- Data Science with R - Capstone Project:Â IBM
- UX Design in Practice: Accessibility and Collaboration:Â Microsoft
- Security and Privacy for Big Data - Part 1:Â EIT Digital
- Modeling and Debugging Embedded Systems:Â University of Colorado Boulder