Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
Multiple educators
Skills you'll gain: Apache Airflow, Data Modeling, Data Pipelines, Data Storage, Data Architecture, Data Transformation, Requirements Analysis, Data Processing, Data Warehousing, Query Languages, Apache Hadoop, Extract, Transform, Load, Data Lakes, Amazon Web Services, File Systems, Data Infrastructure, Database Systems, Data Integration, AWS Kinesis, Infrastructure as Code (IaC)
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Information Privacy, Personally Identifiable Information, Regulatory Compliance, Compliance Management, Compliance Training, Data Security, Health Care Procedure and Regulation, Data Governance, Incident Response
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
Automatic Data Processing, Inc. (ADP)
Skills you'll gain: Payroll, Payroll Processing, Payroll Systems, Payroll Administration, Payroll Tax, Payroll Reporting, Compensation Strategy, Data Entry, Employee Onboarding, Labor Law, Human Resource Strategy, Accounts Payable, Compensation Management, Compensation and Benefits, Non-Profit Accounting, Tax Preparation, Payment Processing and Collection, Tax Compliance, Human Resources, Benefits Administration
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Linux Commands, TCP/IP, General Networking, Scripting, MySQL, Data Structures
University of Geneva
Skills you'll gain: Financial Market, Capital Markets, Market Liquidity, Portfolio Management, Investments, Market Dynamics, Derivatives, Finance, Equities, Financial Policy, Economics, Real Estate, Banking, Risk Management
LearnQuest
Skills you'll gain: Package and Software Management, Linux Administration, Linux, Linux Commands, Virtual Private Networks (VPN), Linux Servers, System Monitoring, Public Key Infrastructure, File Management, Command-Line Interface, Intrusion Detection and Prevention, Git (Version Control System), File Systems, User Accounts, Firewall, Remote Access Systems, Cloud Computing Architecture, DevOps, Virtualization, Cloud Computing
University of Michigan
Skills you'll gain: Application Deployment, Django (Web Framework), Object-Relational Mapping, HTML and CSS, Model View Controller, jQuery, Ajax, Hypertext Markup Language (HTML), JSON, SQL, Databases, Application Development, Javascript, Object Oriented Programming (OOP), Web Development, Back-End Web Development, Data Modeling, Application Security, Web Applications, Web Servers
LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Penetration Testing, Cloud Computing, Cybersecurity, Mobile Security, Application Security, Cyber Threat Intelligence, Virtualization, Encryption, Cryptography, Vulnerability Assessments, SQL
University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, System Monitoring, System Implementation, Systems Administration, Virtualization, Network Security, Linux Commands
Skills you'll gain: System Configuration, Configuration Management, Cybersecurity, Security Awareness, Data Security, Security Controls, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Information Technology Operations, System Monitoring, Key Management, General Networking, Data Integrity
In summary, here are 10 of our most popular breach (security exploit) courses
- Incident Response and Digital Forensics:Â IBM
- DeepLearning.AI Data Engineering:Â DeepLearning.AI
- Privacy Law and Data Protection:Â University of Pennsylvania
- ISC2 Systems Security Certified Practitioner (SSCP):Â ISC2
- ADP Entry-Level Payroll Specialist:Â Automatic Data Processing, Inc. (ADP)
- Akamai Network Engineering:Â Akamai Technologies, Inc.
- Understanding Financial Markets:Â University of Geneva
- Learning Linux for LFCA Certification:Â LearnQuest
- Django for Everybody:Â University of Michigan
- Advanced Cybersecurity:Â LearnKartS