Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
DeepLearning.AI
Skills you'll gain: Database Design, Software Documentation, Software Design Patterns, Database Systems, Software Testing, ChatGPT, Technical Documentation, Generative AI, Software Design, Code Review, Software Architecture, Software Systems, System Design and Implementation, Dependency Analysis, Artificial Intelligence, Software Development Tools, OpenAI, Software Development, Natural Language Processing, Debugging
Skills you'll gain: Network Security, Cloud Computing, Network Infrastructure, Microsoft Azure, Firewall, Computer Networking, Virtualization and Virtual Machines, Networking Hardware, Cybersecurity, Network Protocols, Artificial Intelligence and Machine Learning (AI/ML)
Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, Infrastructure as Code (IaC), Cyber Security Policies, Security Controls, Security Strategy, Identity and Access Management, Threat Detection
- Status: Free
Case Western Reserve University
Skills you'll gain: Criminal Investigation and Forensics, International Relations, Adjudication, Diplomacy, Law, Regulation, and Compliance, Public Safety and National Security, Political Sciences, Ethical Standards And Conduct, Social Justice, Advocacy, Research, Interactive Learning, Policy Analysis
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Security Testing, Network Security, Network Monitoring, Operating Systems
- Status: Free
Stanford University
Skills you'll gain: Physics, Timelines, Scientific Methods, Research, Experimentation, Calculus, Mechanics, Mathematical Modeling
Macquarie University
Skills you'll gain: Excel Formulas, Microsoft Excel, Excel Macros, Data Validation, Spreadsheet Software, Data Modeling, Financial Modeling, Workflow Management, Data Integrity, Auditing, Automation, Data Security
- Status: AI skills
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Cloud Management, Microsoft Azure, Business Software, Computer Hardware, Virtual Machines, Identity and Access Management, Cybersecurity, Network Troubleshooting, Desktop Support, Virtual Private Networks (VPN), Azure Active Directory, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, System Monitoring, Virtualization and Virtual Machines, Disaster Recovery
- Status: AI skills
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, Operating Systems, Network Administration, Network Protocols, Application Security, Microsoft Teams, Productivity Software, Information Systems Security, Multi-Factor Authentication
Skills you'll gain: Extract, Transform, Load, Data Architecture, Data Pipelines, Big Data, Data Warehousing, Data Governance, Data Storage Technologies, Apache Hadoop, Relational Databases, Apache Spark, Data Lakes, Databases, SQL, Data Mart, Data Security
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Cloud Computing, Cloud Storage, Data Storage, Cloud Security, System Monitoring, Encryption, SQL
Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), Generative AI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Natural Language Processing, Anomaly Detection, Vulnerability Management, Incident Management, Artificial Intelligence
In summary, here are 10 of our most popular breach (security exploit) courses
- Generative AI for Software Development:Â DeepLearning.AI
- Introduction to Networking and Cloud Computing:Â Microsoft
- Strategies for Cloud Security Risk Management:Â Google Cloud
- Introduction to International Criminal Law:Â Case Western Reserve University
- Vulnerability Scanning with Nmap: Network Scanning:Â Coursera Project Network
- Understanding Einstein: The Special Theory of Relativity:Â Stanford University
- Excel Skills for Business: Intermediate II:Â Macquarie University
- Microsoft Cloud Support Associate:Â Microsoft
- Microsoft IT Support Specialist:Â Microsoft
- Introduction to Data Engineering:Â IBM