Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Continuous Monitoring, Business Continuity, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Application Security, Incident Management, Security Engineering, Data Security, Network Security, User Provisioning, OSI Models, Data Loss Prevention
Google Cloud
Skills you'll gain: Google Docs, Gmail, Google Sheets, Google Workspace, Presentations, Calendar Management, Spreadsheet Software, File Management, Excel Formulas, Productivity Software, Email Security, Data Visualization, Excel Macros, Data Validation, Document Management, Setting Appointments, Meeting Facilitation, Sales Presentations, Data Analysis Expressions (DAX), Collaboration
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Presentation, Data Governance, Data Security, Data Migration, Database Design, Interactive Data Visualization, Descriptive Statistics, Data Mining, Cloud Storage, Data Visualization Software, Extract, Transform, Load, IBM DB2, Data Management, Relational Databases, MySQL, Excel Formulas
- Status: Free
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), Automation, Event Monitoring, Cyber Threat Hunting, Continuous Monitoring, Security Management, Anomaly Detection, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML)
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Threat Modeling, Personally Identifiable Information, Malware Protection, Email Security, Incident Response
Skills you'll gain: Cloud Infrastructure, Kubernetes, Google Cloud Platform, Identity and Access Management, Application Deployment, Cloud Storage, Containerization, Cloud Computing, CI/CD, Cloud Computing Architecture, Cloud Security, Cloud Applications, Cloud Management, Cloud Services, Load Balancing, Service Level Agreement, Infrastructure as Code (IaC), Virtual Machines, Microservices, Network Planning And Design
Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Data Lakes, Amazon DynamoDB, Amazon Web Services, Serverless Computing, Cloud Computing, Amazon S3, Scalability, Cloud Infrastructure, Amazon Elastic Compute Cloud, Event-Driven Programming, Cloud Security, Solution Architecture, Data Visualization, Cloud Computing Architecture, Cloud Solutions, Data Architecture, Amazon Redshift, Software Architecture
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Kubernetes, Application Deployment, Cloud Storage, Containerization, Cloud Computing, CI/CD, Cloud Computing Architecture, Cloud Security, Cloud Applications, Cloud Services, Load Balancing, Service Level Agreement, Infrastructure as Code (IaC), Virtual Machines, Microservices, Service Level, Data Storage
University of Alberta
Skills you'll gain: Requirements Analysis, Agile Software Development, Agile Methodology, Kanban Principles, Requirements Elicitation, Sprint Retrospectives, Requirements Management, Functional Requirement, Business Requirements, Sprint Planning, Software Development Methodologies, Project Risk Management, Software Development Life Cycle, Scrum (Software Development), Software Technical Review, Risk Management, Software Development, Product Management, Agile Project Management, User Story
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Application Deployment, Kubernetes, Containerization, Database Architecture and Administration, MySQL, PostgreSQL, Identity and Access Management, Cloud Storage, Data Migration, Cloud Services, Cloud Management, Virtual Machines, Cloud API, Cloud Computing, Oracle Databases, Cloud Security, Cloud Applications, Database Administration
In summary, here are 10 of our most popular breach (security exploit) courses
- CISSP Certified Information Systems Security Professional: Packt
- Getting started with Google Workspace: Google Cloud
- IBM Data Management: IBM
- Automated Cyber Security Incident Response: EDUCBA
- Introduction to Cybersecurity Fundamentals: Coursera Instructor Network
- Preparing for Google Cloud Certification: Cloud Architect: Google Cloud
- AWS Cloud Solutions Architect: Amazon Web Services
- Architecting with Google Compute Engine: Google Cloud
- Software Product Management: University of Alberta
- Penetration Testing, Threat Hunting, and Cryptography: IBM