Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "network exploitation"
DeepLearning.AI
Skills you'll gain: Tensorflow, Computer Vision, Image Analysis, Keras (Neural Network Library), Deep Learning, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning
Skills you'll gain: Jupyter, Data Visualization Software, Data Science, GitHub, Big Data, R Programming, Statistical Programming, Application Programming Interface (API), Machine Learning, Cloud Computing, Git (Version Control System), Python Programming, SQL
Skills you'll gain: Istio, Open Web Application Security Project (OWASP), Software Development Life Cycle, Linux Commands, Kubernetes, Unit Testing, Object-Relational Mapping, Application Deployment, NoSQL, Bash (Scripting Language), MongoDB, Shell Script, Cloud-Native Computing, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Jupyter, Grafana
Skills you'll gain: Rmarkdown, Ggplot2, R Programming, Data Analysis, Tidyverse (R Package), Data Visualization Software, Data Cleansing, Statistical Analysis, Data Manipulation, Package and Software Management, Data Structures
Skills you'll gain: PyTorch (Machine Learning Library), Supervised Learning, Feature Engineering, Generative AI, Keras (Neural Network Library), Deep Learning, Jupyter, Natural Language Processing, Reinforcement Learning, Unsupervised Learning, Scikit Learn (Machine Learning Library), Image Analysis, Machine Learning Algorithms, Data Manipulation, Tensorflow, Python Programming, Verification And Validation, Applied Machine Learning, ChatGPT, Artificial Neural Networks
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Applications, Cloud Services, Application Deployment, Virtual Machines, Security Controls, Cloud Computing, Threat Management, Generative AI, Application Security, Virtual Private Networks (VPN)
Skills you'll gain: Data Storytelling, Performance Measurement, Data-Driven Decision-Making, E-Commerce, Digital Marketing, Branding, Marketing Channel, Marketing Strategy and Techniques, Customer Analysis, Advertising, Marketing Analytics, Search Engine Marketing, Customer Engagement, Content Marketing, Brand Awareness, Search Engine Optimization, Social Media Marketing, Target Audience
- Status: Free
Wesleyan University
Skills you'll gain: Social Sciences, Psychology, Persuasive Communication, Sociology, Behavior Management, Conflict Management, Cultural Diversity, Research, Ethical Standards And Conduct, Experimentation
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
- Status: Free
Coursera Project Network
Skills you'll gain: Target Audience, Search Engine Marketing, Advertising Campaigns, Campaign Management, Advertising, Web Analytics, Marketing, Digital Marketing, Return On Investment
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
In summary, here are 10 of our most popular network exploitation courses
- Introduction to TensorFlow for Artificial Intelligence, Machine Learning, and Deep Learning:Â DeepLearning.AI
- Tools for Data Science:Â IBM
- IBM Back-End Development:Â IBM
- Data Analysis with R Programming:Â Google
- IBM AI Engineering:Â IBM
- Security in Google Cloud:Â Google Cloud
- Foundations of Digital Marketing and E-commerce:Â Google
- Social Psychology:Â Wesleyan University
- Sound the Alarm: Detection and Response:Â Google
- IBM Cybersecurity Analyst:Â IBM