Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "post-exploitation techniques"
- Status: Free Trial
Wesleyan University
Skills you'll gain: Storytelling, Peer Review, Writing and Editing, Writing, Editing, Proofreading, Storyboarding, Content Creation, Constructive Feedback, Persistence, Professionalism, Creativity
- Status: Free Trial
University of California, Davis
Skills you'll gain: ArcGIS, GIS Software, Spatial Analysis, Data Storytelling, Spatial Data Analysis, Geographic Information Systems, Data Presentation, Data Sharing, Geospatial Mapping, Public Health, Land Management, Heat Maps, Metadata Management, Community Health, Data Mapping, Data Visualization Software, Data Quality, File Management, Network Analysis, Data Modeling
- Status: Preview
Duke University
Skills you'll gain: Neurology, Anatomy, Medical Science and Research, Psychology, Pathology, Molecular Biology, Biology, Pharmacology
- Status: Preview
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms
- Status: Free TrialStatus: AI skills
Skills you'll gain: PyTorch (Machine Learning Library), Keras (Neural Network Library), Deep Learning, Reinforcement Learning, Unsupervised Learning, Artificial Neural Networks, Generative AI, Tensorflow, Machine Learning Methods, Image Analysis, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Computer Vision, Regression Analysis, Time Series Analysis and Forecasting, Network Architecture, Network Model, Predictive Modeling, Natural Language Processing, Applied Machine Learning
- Status: Free Trial
Skills you'll gain: Prompt Engineering, ChatGPT, Large Language Modeling, IBM Cloud
- Status: Free Trial
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
- Status: Free Trial
University of Michigan
Skills you'll gain: Database Design, SQL, MySQL, PHP (Scripting Language), Relational Databases, JSON, jQuery, Hypertext Markup Language (HTML), Javascript and jQuery, Ajax, Databases, Data Modeling, Database Application, Database Development, Debugging, Web Applications, Object Oriented Programming (OOP), Web Development, Authentications, Javascript
- Status: Free Trial
University of Michigan
Skills you'll gain: Debugging, Programming Principles, Python Programming, Data Structures, Scripting Languages, Computer Programming, Development Environment, Computer Graphics
- Status: Free Trial
University of California San Diego
Skills you'll gain: Algorithms, Program Development, Debugging, Development Testing, Test Engineering, Software Testing, Computational Thinking, Test Case, Computer Programming, Programming Principles, Data Structures, Theoretical Computer Science, Bioinformatics, Design Strategies
- Status: Free Trial
University of Virginia
Skills you'll gain: Usability Testing, Agile Product Development, Continuous Delivery, Agile Software Development, User Story, Agile Methodology, Product Testing, Agile Project Management, Team Performance Management, Team Management, Design Thinking, Team Building, Team Leadership, Product Improvement, DevOps, Customer Analysis, Analytics, Product Management, Product Development, Persona (User Experience)
- Status: Free Trial
Macquarie University
Skills you'll gain: Overcoming Objections, Influencing, Risk Management Framework, Persuasive Communication, Governance, Storytelling, Risk Management, Change Management, Organizational Change, Rapport Building, Meeting Facilitation, Leadership, Conflict Management, Enterprise Risk Management (ERM), Business Transformation, Negotiation, Communication, Intercultural Competence, Stakeholder Management, Process Management
In summary, here are 10 of our most popular post-exploitation techniques courses
- Creative Writing: Wesleyan University
- Geographic Information Systems (GIS): University of California, Davis
- Medical Neuroscience: Duke University
- Cryptography I: Stanford University
- IBM Deep Learning with PyTorch, Keras and Tensorflow: IBM
- Generative AI: Prompt Engineering Basics: IBM
- Assets, Threats, and Vulnerabilities: Google
- Web Applications for Everybody: University of Michigan
- Python Basics: University of Michigan
- Algorithmic Toolbox: University of California San Diego