Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
Skills you'll gain: Cloud Infrastructure, Kubernetes, Google Cloud Platform, Identity and Access Management, Cloud Storage, Containerization, Infrastructure As A Service (IaaS), Cloud Computing Architecture, Cloud Applications, Cloud Management, Cloud Services, Load Balancing, Cloud Engineering, Application Deployment, Infrastructure as Code (IaC), Virtual Machines, Cloud Computing, Data Storage, Network Infrastructure, Docker (Software)
Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Network Monitoring, Cloud Computing Architecture, Containerization, Network Architecture, Role-Based Access Control (RBAC), Network Security, OAuth, Cloud Storage, Network Routing, Cloud Security, Virtual Private Networks (VPN)
Skills you'll gain: Debugging, Python Programming, Cybersecurity, Scripting, Programming Principles, Data Import/Export, Algorithms, Automation, Computer Programming, File Management
Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Data Lakes, Amazon DynamoDB, Amazon Web Services, Serverless Computing, Cloud Computing, Amazon S3, Scalability, Cloud Infrastructure, Amazon Elastic Compute Cloud, Event-Driven Programming, Cloud Security, Solution Architecture, Data Visualization, Cloud Computing Architecture, Cloud Solutions, Data Architecture, Amazon Redshift, Software Architecture
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Presentation, Data Governance, Data Security, Data Migration, Database Design, Interactive Data Visualization, Descriptive Statistics, Data Mining, Cloud Storage, Data Visualization Software, Extract, Transform, Load, IBM DB2, Data Management, Relational Databases, MySQL, Excel Formulas
University of Alberta
Skills you'll gain: Requirements Analysis, Agile Software Development, Agile Methodology, Kanban Principles, Requirements Elicitation, Sprint Retrospectives, Requirements Management, Functional Requirement, Business Requirements, Sprint Planning, Software Development Methodologies, Project Risk Management, Software Development Life Cycle, Scrum (Software Development), Software Technical Review, Risk Management, Software Development, Product Management, Agile Project Management, User Story
- Status: Free
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), Automation, Event Monitoring, Cyber Threat Hunting, Continuous Monitoring, Security Management, Anomaly Detection, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML)
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Kubernetes, Application Deployment, Cloud Storage, Infrastructure As A Service (IaaS), Containerization, Cloud Computing, CI/CD, Cloud Computing Architecture, Cloud Security, Cloud Applications, Cloud Services, Load Balancing, Service Level Agreement, Infrastructure as Code (IaC), Virtual Machines, Microservices, Service Level
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Application Deployment, Kubernetes, Containerization, Database Architecture and Administration, MySQL, PostgreSQL, Identity and Access Management, Cloud Storage, Data Migration, Cloud Services, Cloud Management, Virtual Machines, Cloud API, Cloud Computing, Oracle Databases, Cloud Security, Cloud Applications, Database Administration
Skills you'll gain: Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix Shell, Query Languages, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
In summary, here are 10 of our most popular breach (security exploit) courses
- Preparing for Google Cloud Certification: Cloud Engineer:Â Google Cloud
- Preparing for Google Cloud Certification: Cloud Security Engineer:Â Google Cloud
- Automate Cybersecurity Tasks with Python:Â Google
- AWS Cloud Solutions Architect:Â Amazon Web Services
- IBM Data Management:Â IBM
- Software Product Management:Â University of Alberta
- Automated Cyber Security Incident Response:Â EDUCBA
- Operating Systems: Overview, Administration, and Security:Â IBM
- Architecting with Google Compute Engine:Â Google Cloud
- Google Cloud Database Engineer:Â Google Cloud