Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability & penetration testing"
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Application Security, Vulnerability Assessments, Vulnerability Management, Extensible Markup Language (XML), Scripting, Cybersecurity
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Role-Based Access Control (RBAC), Containerization
Skills you'll gain: Blockchain, Digital Assets, Transportation, Supply Chain, and Logistics, Plan Execution, Supply Chain, Governance, Supply Chain Management, Business Transformation, FinTech, Supply Chain Systems, Business Analysis, Market Opportunities, Competitive Analysis, Interoperability, Strategic Partnership, Operational Analysis, Emerging Technologies, Logistics, Market Analysis, E-Commerce
University of Virginia
Skills you'll gain: Brainstorming, Design Thinking, Ideation, Creative Thinking, Creative Problem-Solving, Innovation, Product Development, New Product Development, User Feedback, Prioritization, Stakeholder Engagement, Collaboration, Product Testing
Icahn School of Medicine at Mount Sinai
Skills you'll gain: Science and Research, Scientific Methods, Analysis, Systems Analysis, Integration Testing, Systems Integration, Life Sciences, Data Analysis
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Continuous Monitoring, Business Continuity, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Application Security, Incident Management, Security Engineering, Data Security, Network Security, User Provisioning, OSI Models, Data Loss Prevention
- Status: Free
University of Illinois Urbana-Champaign
Skills you'll gain: Interactive Design, Computational Thinking, Emerging Technologies, Digital Transformation, Technical Communication, Artificial Intelligence, Innovation, Cloud Applications
Skills you'll gain: Design Thinking, Data Science, Artificial Intelligence, Process Design, Data Pipelines, Data Processing, Workflow Management, Data Cleansing, Data Quality, Data-Driven Decision-Making, Business Priorities, NumPy, Python Programming
Skills you'll gain: Databricks, Microsoft Azure, Data Science, Big Data, MLOps (Machine Learning Operations), Predictive Modeling, Data Processing, Scikit Learn (Machine Learning Library), Machine Learning, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Tensorflow
King Abdullah University of Science and Technology
Skills you'll gain: Statistical Analysis, Bioinformatics, Unix, Scientific Visualization, Statistical Methods, R Programming, Rmarkdown, Unix Commands, Data Analysis, Data Quality, Statistical Hypothesis Testing, Exploratory Data Analysis, Programming Principles, Pandas (Python Package), Python Programming, NumPy, Data Manipulation, Computer Programming
Xi'an Jiaotong University
Skills you'll gain: Microsoft SQL Servers, ASP.NET, SQL, C# (Programming Language), Object Oriented Programming (OOP), Relational Databases, .NET Framework, Program Development, Operating Systems, System Testing, Database Design, Database Management, Debugging, Databases, User Interface (UI), Microsoft Visual Studio, Web Development, Programming Principles, UI Components, Computer Programming
Skills you'll gain: Extract, Transform, Load, Data Analysis, Jupyter, Unsupervised Learning, Applied Machine Learning, Statistical Analysis, Exploratory Data Analysis, Data Migration, Machine Learning, Business Analytics, Analytical Skills, Data Manipulation, Data Cleansing, Stakeholder Engagement, Machine Learning Algorithms, Project Scoping, Business Priorities, Business Analysis, Classification And Regression Tree (CART), Stakeholder Management
In summary, here are 10 of our most popular vulnerability & penetration testing courses
- Previous OWASP Risks: Infosec
- Cloud Security Risks: Identify and Protect Against Threats: Google Cloud
- Web3 and Blockchain in Global Commerce: INSEAD
- Design Thinking: Ideas to Action: University of Virginia
- Integrated Analysis in Systems Biology: Icahn School of Medicine at Mount Sinai
- CISSP Certified Information Systems Security Professional: Packt
- Ubiquitous Learning and Instructional Technologies: University of Illinois Urbana-Champaign
- AI Workflow: Business Priorities and Data Ingestion: IBM
- Prepare for DP-100: Data Science on Microsoft Azure Exam: Microsoft
- Fundamental Skills in Bioinformatics: King Abdullah University of Science and Technology