Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "os vulnerability exploitation and mitigation"
DeepLearning.AI
Skills you'll gain: Deep Learning, Artificial Neural Networks, Tensorflow, Supervised Learning, Keras (Neural Network Library), Artificial Intelligence, Machine Learning, Python Programming, NumPy, Performance Tuning
Skills you'll gain: Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix Shell, Query Languages, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Skills you'll gain: Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
- Status: AI skills
Skills you'll gain: Dashboard, Data Visualization Software, Data Wrangling, Data Visualization, SQL, Supervised Learning, Feature Engineering, Plotly, Interactive Data Visualization, Jupyter, Statistical Reporting, Exploratory Data Analysis, Data Mining, Data Cleansing, Matplotlib, Data Analysis, Unsupervised Learning, Generative AI, Pandas (Python Package), Professional Networking
Skills you'll gain: Data Storytelling, Data Presentation, Interactive Data Visualization, Data Visualization Software, Shiny (R Package), Data Wrangling, Exploratory Data Analysis, Statistical Visualization, Relational Databases, Big Data, Ggplot2, Database Design, Data Analysis, IBM Cognos Analytics, Data Mining, Dashboard, Excel Formulas, Data Manipulation, Web Scraping, Microsoft Excel
Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Information Systems Security Assessment Framework (ISSAF), Security Strategy, Security Awareness, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis, Personally Identifiable Information
- Status: AI skills
Skills you'll gain: Istio, Node.JS, Software Development Life Cycle, Kubernetes, Unit Testing, Object-Relational Mapping, Cloud Computing Architecture, Server Side, Application Deployment, React Redux, Cloud Services, Cloud-Native Computing, OpenShift, Git (Version Control System), Full-Stack Web Development, HTML and CSS, Cloud Computing, Jupyter, Generative AI, Interviewing Skills
University of Michigan
Skills you'll gain: Web Scraping, Data Processing, Relational Databases, JSON, Database Design, SQL, Network Protocols, Databases, Web Services, Restful API, Programming Principles, Data Cleansing, Data Structures, Data Storytelling, Data Collection, Computer Programming, Python Programming, Data Manipulation, Development Environment, Computational Thinking
Skills you'll gain: Data Storytelling, Performance Measurement, Data-Driven Decision-Making, E-Commerce, Digital Marketing, Branding, Marketing Channel, Marketing Strategy and Techniques, Customer Analysis, Advertising, Marketing Analytics, Search Engine Marketing, Customer Engagement, Content Marketing, Brand Awareness, Search Engine Optimization, Social Media Marketing, Target Audience
DeepLearning.AI
Skills you'll gain: Tensorflow, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Performance Tuning, Machine Learning Methods, Artificial Neural Networks, Applied Machine Learning, Machine Learning, Supervised Learning, Machine Learning Algorithms, Network Architecture, Algorithms, Analysis, Debugging
University of Michigan
Skills you'll gain: Data Structures, Python Programming, Data Manipulation, Development Environment, File Management, Data Analysis, Computer Programming, Software Installation
- Status: Free
Duke University
Skills you'll gain: Market Dynamics, Operating Cost, Transportation Operations, Production Process, Manufacturing Operations, Cost Estimation, Global Marketing, Market Analysis, Natural Resource Management, Logistics
In summary, here are 10 of our most popular os vulnerability exploitation and mitigation courses
- Neural Networks and Deep Learning: DeepLearning.AI
- Tools of the Trade: Linux and SQL: Google
- Play It Safe: Manage Security Risks: Google
- IBM Data Science: IBM
- IBM Data Analytics with Excel and R: IBM
- Foundations of Cybersecurity: Google
- IBM Full Stack Software Developer: IBM
- Python for Everybody: University of Michigan
- Foundations of Digital Marketing and E-commerce: Google
- Improving Deep Neural Networks: Hyperparameter Tuning, Regularization and Optimization: DeepLearning.AI