Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
University of Toronto
Skills you'll gain: Automation, Simulation and Simulation Software, Software Architecture, Hardware Architecture, Process Control, Systems Architecture, Computer Vision, Verification And Validation, Mathematical Modeling, Mechanical Engineering, Safety and Security
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Security Testing, Software Design, Vulnerability Management, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
The Hong Kong University of Science and Technology
Skills you'll gain: FinTech, Financial Regulation, Business Continuity Planning, Compliance Management, Disaster Recovery, Financial Regulations, Operational Risk, Bank Regulations, Financial Services, Security Management, Risk Management, Business Risk Management, Financial Industry Regulatory Authorities, Information Technology, Market Trend, Banking Services, Financial Systems, Emerging Technologies, Workforce Development, Banking
Skills you'll gain: Desktop Support, Hardware Troubleshooting, Operating Systems, Network Troubleshooting, Command-Line Interface, System Support, Computer Hardware, Network Security, Mobile Security, Microsoft Windows, General Networking, Unix Commands, Technical Support, Mac OS, Network Administration, Linux, System Configuration, Infrastructure Security, Computer Displays, Software Installation
Skills you'll gain: Identity and Access Management, Cloud Security, DevSecOps, Cloud Computing, Role-Based Access Control (RBAC), Google Cloud Platform, Network Security, Cloud Computing Architecture, IT Automation, General Networking, Infrastructure Security, Security Controls, Infrastructure as Code (IaC), Virtualization
Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, NIST 800-53, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR), Business Ethics
Google
Skills you'll gain: Systems Administration, IT Security Architecture, Remote Access Systems, IT Infrastructure, Hardening, Network Troubleshooting, OSI Models, Computer Networking, Routing Protocols, Desktop Support, Application Security, Security Strategy, Server Administration, Technical Support, Lightweight Directory Access Protocols, Microsoft Windows, File Systems, Computer Hardware, Software Installation, Help Desk Support
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Software Testing, Selenium (Software), Gherkin (Scripting Language), JUnit, Verification And Validation, Test Automation, Unit Testing, Security Testing, Regression Testing, Test Case, Software Development Tools, Testability, Behavior-Driven Development, Code Coverage, Performance Testing, Development Testing, Software Engineering Tools, Test Planning, Acceptance Testing
Johns Hopkins University
Skills you'll gain: Electronic Medical Record, Patient Safety, Health Information Management and Medical Records, Personally Identifiable Information, Encryption, Help Desk Support, Desktop Support, System Support, End User Training and Support, Healthcare Industry Knowledge, Decision Support Systems, Health Care Procedure and Regulation, Computerized Physician Order Entry, Data Security, Health Care, Technical Support, Cyber Attacks, Health Systems, Patient Education and Support, Patient Registration
Columbia University
Skills you'll gain: Portfolio Management, Derivatives, Financial Market, Securities (Finance), Investment Management, Asset Management, Credit Risk, Mortgage Loans, Mathematical Modeling, Applied Mathematics, Capital Markets, Financial Modeling, Securities Trading, Regression Analysis, Market Liquidity, Futures Exchange, Risk Management, Equities, Finance, Market Data
- Status: Free
University of Virginia
Skills you'll gain: International Relations, Social Studies, Political Sciences, Social Sciences, Socioeconomics, Cultural Diversity, Economics, Public Safety and National Security, Governance
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Software Design Documents, Databases, Technical Design, Software Architecture, Secure Coding, Software Design Patterns, Systems Design, Software Engineering, Software Development Life Cycle, Security Engineering
In summary, here are 10 of our most popular breach (security exploit) courses
- Introduction to Self-Driving Cars:Â University of Toronto
- Secure Coding Practices:Â University of California, Davis
- FinTech: Finance Industry Transformation and Regulation:Â The Hong Kong University of Science and Technology
- Preparation for CompTIA A+ Certification:Â IBM
- Introduction to Security Principles in Cloud Computing:Â Google Cloud
- Cybersecurity Compliance Framework, Standards & Regulations:Â IBM
- Suporte em TI do Google:Â Google
- Software Testing and Automation:Â University of Minnesota
- Healthcare IT Support:Â Johns Hopkins University
- Financial Engineering and Risk Management:Â Columbia University