Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
University of Toronto
Skills you'll gain: Automation, Simulation and Simulation Software, Software Architecture, Hardware Architecture, Process Control, Systems Architecture, Computer Vision, Verification And Validation, Mathematical Modeling, Mechanical Engineering, Safety and Security
Skills you'll gain: Virtualization, Operating Systems, IBM Cloud, Virtual Machines, Infrastructure Architecture, IT Infrastructure, Computer Architecture, Data Centers, Computer Systems, Information Systems Security, Computer Hardware, Cryptography, Transaction Processing
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Security Testing, Software Design, Vulnerability Management, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, NIST 800-53, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR), Business Ethics
The Hong Kong University of Science and Technology
Skills you'll gain: FinTech, Financial Regulation, Business Continuity Planning, Compliance Management, Disaster Recovery, Financial Regulations, Operational Risk, Bank Regulations, Financial Services, Security Management, Risk Management, Business Risk Management, Information Technology, Law, Regulation, and Compliance, Market Trend, Banking Services, Financial Systems, Emerging Technologies, Workforce Development, Banking
Skills you'll gain: Identity and Access Management, Cloud Security, DevSecOps, Cloud Computing, Role-Based Access Control (RBAC), Google Cloud Platform, Network Security, Cloud Computing Architecture, IT Automation, General Networking, Infrastructure Security, Security Controls, Infrastructure as Code (IaC), Virtualization
Skills you'll gain: Desktop Support, Hardware Troubleshooting, Operating Systems, Network Troubleshooting, Command-Line Interface, System Support, Computer Hardware, Network Security, Mobile Security, Microsoft Windows, General Networking, Unix Commands, Technical Support, Mac OS, Network Administration, Linux, System Configuration, Infrastructure Security, Computer Displays, Software Installation
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Software Testing, Selenium (Software), Gherkin (Scripting Language), JUnit, Verification And Validation, Test Automation, Unit Testing, Security Testing, Regression Testing, Test Case, Software Development Tools, Testability, Behavior-Driven Development, Code Coverage, Performance Testing, Development Testing, Software Engineering Tools, Test Planning, Acceptance Testing
Google
Skills you'll gain: Systems Administration, IT Security Architecture, Remote Access Systems, IT Infrastructure, Hardening, Network Troubleshooting, OSI Models, Computer Networking, Routing Protocols, Desktop Support, Application Security, Security Strategy, Server Administration, Technical Support, Lightweight Directory Access Protocols, Microsoft Windows, File Systems, Computer Hardware, Software Installation, Help Desk Support
Johns Hopkins University
Skills you'll gain: Electronic Medical Record, Patient Safety, Health Information Management and Medical Records, Security Awareness, Personally Identifiable Information, Encryption, Help Desk Support, Desktop Support, System Support, End User Training and Support, Healthcare Industry Knowledge, Decision Support Systems, Health Care Procedure and Regulation, Computerized Physician Order Entry, Data Security, Health Care, Technical Support, Cyber Attacks, Health Systems, Patient Education and Support
Columbia University
Skills you'll gain: Portfolio Management, Derivatives, Financial Market, Securities (Finance), Investment Management, Asset Management, Credit Risk, Mortgage Loans, Mathematical Modeling, Applied Mathematics, Capital Markets, Financial Modeling, Securities Trading, Regression Analysis, Market Liquidity, Futures Exchange, Risk Management, Equities, Finance, Market Data
Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cybersecurity, Network Security, Cyber Security Strategy, System Monitoring, Cyber Operations, Threat Management, Continuous Monitoring, Cyber Threat Intelligence, Incident Response, Cyber Attacks, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Python Programming, Data Access, Intrusion Detection and Prevention
In summary, here are 10 of our most popular breach (security exploit) courses
- Introduction to Self-Driving Cars:Â University of Toronto
- Introduction to Enterprise Computing:Â IBM
- Secure Coding Practices:Â University of California, Davis
- Cybersecurity Compliance Framework, Standards & Regulations:Â IBM
- FinTech: Finance Industry Transformation and Regulation:Â The Hong Kong University of Science and Technology
- Introduction to Security Principles in Cloud Computing:Â Google Cloud
- Preparation for CompTIA A+ Certification:Â IBM
- Software Testing and Automation:Â University of Minnesota
- Suporte em TI do Google:Â Google
- Healthcare IT Support:Â Johns Hopkins University