Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
- Status: Free
Stanford University
Skills you'll gain: Physics, Timelines, Scientific Methods, Research, Experimentation, Calculus, Mechanics, Mathematical Modeling
Macquarie University
Skills you'll gain: Excel Formulas, Microsoft Excel, Excel Macros, Data Validation, Spreadsheet Software, Data Modeling, Workflow Management, Financial Modeling, Data Integrity, Auditing, Automation, Data Security
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Stakeholder Communications, Incident Response, Intrusion Detection and Prevention, Threat Management, Business Risk Management, Network Security, Vulnerability Assessments, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Computer Security Incident Management, Security Awareness, Bash (Scripting Language), Event Monitoring, Security Controls, Cybersecurity, Debugging
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Cloud Computing, Cloud Storage, Data Storage, Cloud Security, System Monitoring, Encryption, SQL
Skills you'll gain: Extract, Transform, Load, Data Architecture, Data Pipelines, Big Data, Data Warehousing, Data Governance, Data Storage Technologies, Apache Hadoop, Relational Databases, Apache Spark, Data Lakes, Databases, SQL, Data Mart, Data Security
- Status: AI skills
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Cloud Management, Microsoft Azure, Business Software, Computer Hardware, Virtual Machines, Identity and Access Management, Cybersecurity, Network Troubleshooting, Desktop Support, Virtual Private Networks (VPN), Azure Active Directory, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, System Monitoring, Virtualization and Virtual Machines, Disaster Recovery
University of Michigan
Skills you'll gain: Payment Systems, Payment Processing, FinTech, Blockchain, Mobile Banking, Credit/Debit Card Processing, Banking Services, Emerging Technologies, Investment Management, Wealth Management, Asset Management, Investments, Point of Sale, Mobile Security, Banking, Fundraising, Capital Markets, Consumer Lending, Market Dynamics, Digital Assets
Skills you'll gain: Database Management, Databases, Relational Databases, Data Security, User Accounts, SQL, Stored Procedure, Database Design, Application Security, Threat Modeling, Vulnerability Scanning, Cybersecurity, NoSQL, Data Integrity, Role-Based Access Control (RBAC), Encryption
- Status: Free
Infosec
Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Information Systems Security, Application Security, Security Management, Computer Security Incident Management, Network Security, IT Security Architecture, Threat Management, Security Information and Event Management (SIEM), Security Controls, Identity and Access Management, Cryptography, Threat Detection, Cyber Security Policies, Data Security, Encryption, Security Strategy, Incident Management
- Status: AI skills
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, Operating Systems, Network Protocols, TCP/IP, Application Security, Microsoft Teams, Productivity Software, Information Systems Security, Multi-Factor Authentication
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, Infrastructure as Code (IaC), Cyber Security Policies, Security Controls, Security Strategy, Identity and Access Management, Threat Detection
In summary, here are 10 of our most popular breach (security exploit) courses
- Understanding Einstein: The Special Theory of Relativity:Â Stanford University
- Excel Skills for Business: Intermediate II:Â Macquarie University
- Ciberseguridad de Google:Â Google
- Essential Google Cloud Infrastructure: Core Services:Â Google Cloud
- Introduction to Data Engineering:Â IBM
- Microsoft Cloud Support Associate:Â Microsoft
- Financial Technology (Fintech) Innovations:Â University of Michigan
- Database Essentials and Vulnerabilities:Â IBM
- CompTIA Security+ 701:Â Infosec
- Microsoft IT Support Specialist:Â Microsoft