Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
Coursera Project Network
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Web Scraping, Web Applications
University at Buffalo
Skills you'll gain: Model Based Systems Engineering, Systems Engineering, Product Lifecycle Management, Intrusion Detection and Prevention, Security Controls, Performance Measurement, Anomaly Detection, Machine Controls, Incident Response, Digital Transformation, Vulnerability Assessments, Software Development Life Cycle, Product Engineering, Process Analysis, Cybersecurity, Supply Chain Management, Data Sharing, Manufacturing Processes, Manufacturing Operations, Constructive Feedback
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cryptography, Cyber Security Assessment, Cyber Risk, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Security Policies, Infrastructure Security, Security Awareness, Identity and Access Management
Workday
Skills you'll gain: Workday (Software), Security Controls, Business Process, Workflow Management, Business Reporting, Human Resources Software, System Configuration, Role-Based Access Control (RBAC), Organizational Structure
- Status: Free
Universiteit Leiden
Skills you'll gain: Public Safety and National Security, Research, Policy Analysis, Media and Communications, Social Studies, International Relations, Political Sciences, Trend Analysis, Psychology, Ethical Standards And Conduct
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Cyber Risk, Threat Detection, Security Controls, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Threat Detection, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Encryption, Cyber Threat Intelligence, Incident Management, Information Systems Security, Threat Management
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Planning And Design, Network Security, Network Architecture, General Networking, Network Performance Management, Computer Networking, Network Model, Wireless Networks, Software-Defined Networking, Algorithms, System Programming, Data Integrity
- Status: AI skills
Microsoft
Skills you'll gain: Microsoft Power Platform, Excel Formulas, Process Flow Diagrams, Business Process Modeling, User Story, Business Requirements, Stakeholder Management, Data Modeling, Microsoft Excel, Microsoft Visio, Software Development Life Cycle, Requirements Analysis, Requirements Elicitation, Quality Management, Pivot Tables And Charts, Power BI, Project Management Life Cycle, Microsoft Power Automate/Flow, Business Analysis, Project Management
DeepLearning.AI
Skills you'll gain: Database Design, Software Documentation, Software Design Patterns, Database Systems, Software Testing, ChatGPT, Technical Documentation, Generative AI, Software Design, Code Review, Software Architecture, Software Systems, System Design and Implementation, Dependency Analysis, Artificial Intelligence, Software Development Tools, OpenAI, Software Development, Natural Language Processing, Debugging
- Status: Free
Case Western Reserve University
Skills you'll gain: Criminal Investigation and Forensics, International Relations, Adjudication, Diplomacy, Law, Regulation, and Compliance, Public Safety and National Security, Political Sciences, Ethical Standards And Conduct, Social Justice, Advocacy, Research, Interactive Learning, Policy Analysis
LearnKartS
Skills you'll gain: Penetration Testing, Cybersecurity, Cyber Attacks, Network Security, Security Testing, Information Systems Security, Cyber Threat Intelligence, Application Security, Vulnerability Assessments, Data Ethics, Security Awareness, Web Servers, Network Analysis
In summary, here are 10 of our most popular breach (security exploit) courses
- Web Application Security Testing with OWASP ZAP:Â Coursera Project Network
- Digital Manufacturing & Design Technology:Â University at Buffalo
- Cybersecurity and Its Ten Domains:Â Kennesaw State University
- Workday Basics Series:Â Workday
- Terrorism and Counterterrorism: Comparing Theory and Practice:Â Universiteit Leiden
- The Foundations of Cybersecurity:Â Kennesaw State University
- Cybersecurity Operations Fundamentals:Â Cisco Learning and Certifications
- Computer Communications:Â University of Colorado System
- Microsoft Business Analyst:Â Microsoft
- Generative AI for Software Development:Â DeepLearning.AI