Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "os vulnerability exploitation and mitigation"
DeepLearning.AI
Skills you'll gain: Tensorflow, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Performance Tuning, Machine Learning Methods, Artificial Neural Networks, Applied Machine Learning, Machine Learning, Supervised Learning, Machine Learning Algorithms, Network Architecture, Algorithms, Analysis, Debugging
Skills you'll gain: Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
Multiple educators
Skills you'll gain: Software Development Life Cycle, Computing Platforms, Network Security, Incident Response, Cloud Computing Architecture, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Peripheral Devices, Cybersecurity, Configuration Management, Cloud Security, Cloud Infrastructure, Cloud Applications, Network Troubleshooting
University of Michigan
Skills you'll gain: Web Scraping, Data Processing, Relational Databases, JSON, Database Design, SQL, Network Protocols, Databases, Web Services, Restful API, Programming Principles, Data Cleansing, Data Structures, Data Storytelling, Data Collection, Computer Programming, Python Programming, Data Manipulation, Development Environment, Computational Thinking
University of Michigan
Skills you'll gain: Data Structures, Python Programming, Data Manipulation, Development Environment, File Management, Data Analysis, Computer Programming, Software Installation
- Status: Free
Duke University
Skills you'll gain: Market Dynamics, Operating Cost, Transportation Operations, Production Process, Manufacturing Operations, Cost Estimation, Global Marketing, Market Analysis, Natural Resource Management, Logistics
Skills you'll gain: Active Listening, Problem Solving, Collaboration, Presentations, Interpersonal Communications, Teamwork, Conflict Management, Creative Problem-Solving, Constructive Feedback, Creative Thinking, Root Cause Analysis, Team Building, Virtual Teams, Team Oriented, Public Speaking, Agile Methodology, Persuasive Communication, Client Services, Ability To Meet Deadlines, Business Research
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, Network Architecture, Routing Protocols, Network Protocols, OSI Models, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks, Network Model
University of Michigan
Skills you'll gain: Talent Management, Team Motivation, Team Building, Teamwork, Team Management, Talent Pipelining, Influencing, Team Leadership, Motivational Skills, Employee Onboarding, Employee Performance Management, Employee Coaching, Conflict Management, Employee Engagement, Interviewing Skills, Persuasive Communication, Leadership, Professional Networking, Business Leadership, Leadership Development
Skills you'll gain: Computer Hardware, Technical Support, Software Installation, Operating Systems, Technical Documentation, Hardware Troubleshooting, Computer Networking, Information Technology, Technical Communication, TCP/IP, Software Systems, Linux, Microsoft Windows
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Google Sheets, Business Analytics, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Strategy, Data Visualization Software, SQL
Skills you'll gain: Spreadsheet Software, Stakeholder Communications, Dashboard, Stakeholder Management, Data-Driven Decision-Making, Data Analysis, Analytical Skills, Data Presentation, Business Analysis, Quantitative Research, Systems Thinking, Communication
In summary, here are 10 of our most popular os vulnerability exploitation and mitigation courses
- Improving Deep Neural Networks: Hyperparameter Tuning, Regularization and Optimization: DeepLearning.AI
- Play It Safe: Manage Security Risks: Google
- IBM and ISC2 Cybersecurity Specialist: ISC2
- Python for Everybody: University of Michigan
- Python Data Structures: University of Michigan
- Oil & Gas Industry Operations and Markets : Duke University
- People and Soft Skills for Professional and Personal Success: IBM
- The Bits and Bytes of Computer Networking: Google
- Leading People and Teams: University of Michigan
- Technical Support Fundamentals: Google