Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
University of Michigan
Skills you'll gain: PHP (Scripting Language), Hypertext Markup Language (HTML), MySQL, Web Applications, Web Development, Cascading Style Sheets (CSS), Development Environment, Back-End Web Development, Database Development, Web Servers, Application Security, Software Installation, Data Validation
University of Washington
Skills you'll gain: Regression Analysis, Predictive Modeling, Supervised Learning, Statistical Modeling, Applied Machine Learning, Machine Learning Algorithms, Feature Engineering, Machine Learning, Statistical Methods, Dimensionality Reduction, Python Programming, Data Validation
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
EIT Digital
Skills you'll gain: Embedded Systems, Embedded Software, Internet Of Things, Cryptography, Operating Systems, Security Requirements Analysis, Network Architecture, Network Security, Cybersecurity, Real Time Data, Web Services, Encryption, Engineering Software, Network Protocols, Public Key Cryptography Standards (PKCS), Wireless Networks, Computer Programming, C (Programming Language), System Testing, System Design and Implementation
Skills you'll gain: Incident Response, Business Continuity, Disaster Recovery, Cybersecurity, Security Management, Computer Security Incident Management, Crisis Management, Information Assurance
- Status: AI skills
Skills you'll gain: Git (Version Control System), Software Development Methodologies, JUnit, Requirements Analysis, Version Control, Application Development, Software Development Life Cycle, SQL, Full-Stack Web Development, Test Driven Development (TDD), Software Development, Restful API, Object Oriented Programming (OOP), Object Oriented Design, Database Management, MySQL, Digital Transformation, Relational Databases, Java Programming, Generative AI
University of Colorado System
Skills you'll gain: Digital Communications, OSI Models, Network Protocols, TCP/IP, Network Routing, Network Architecture, Network Planning And Design, General Networking, Computer Networking, Network Model, System Programming, Data Integrity
The University of Melbourne
Skills you'll gain: Financial Analysis, Financial Statement Analysis, Financial Statements, Corporate Finance, Financial Management, Financial Accounting, Accounting, Financial Systems, Financial Modeling, Investments, Capital Markets, Market Liquidity, Balance Sheet, Derivatives, Financial Market, Income Statement, Business Valuation, International Finance, Mergers & Acquisitions, Capital Budgeting
Microsoft
Skills you'll gain: Stakeholder Management, Business Analysis, Project Management, Analysis, Business Requirements, Risk Management, Microsoft Power Platform, Requirements Analysis, Problem Management
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Application Specific Integrated Circuits, Cryptography, Encryption, Technical Design, Emerging Technologies, System Design and Implementation
In summary, here are 10 of our most popular breach (security exploit) courses
- Building Web Applications in PHP:Â University of Michigan
- Machine Learning: Regression:Â University of Washington
- Introduction to Applied Cryptography:Â University of Colorado System
- Cybersecurity Tools and Technologies:Â Microsoft
- Development of Secure Embedded Systems:Â EIT Digital
- Incident Response, BC, and DR Concepts:Â ISC2
- Amazon Junior Software Developer:Â Amazon
- Fundamentals of Network Communication:Â University of Colorado System
- Essentials of Corporate Finance:Â The University of Melbourne
- Business Analysis Fundamentals:Â Microsoft