Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
University of California, Irvine
Skills you'll gain: Test Planning, Embedded Systems, Linux, Internet Of Things, Embedded Software, Functional Requirement, Debugging, General Networking, Hardware Design, Operating Systems, Requirements Analysis, Electronic Hardware, System Design and Implementation, Development Testing, C (Programming Language), Basic Electrical Systems, Application Programming Interface (API), TCP/IP, Wireless Networks, Integrated Development Environments
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Threat Modeling, Personally Identifiable Information, Malware Protection, Email Security, Incident Response
Skills you'll gain: Site Reliability Engineering, Kubernetes, Application Performance Management, Google Cloud Platform, Cloud Infrastructure, System Monitoring, Application Deployment, Identity and Access Management, Containerization, DevOps, CI/CD, Cloud Storage, Cloud Security, Cloud Applications, Cloud Services, Cloud Management, Service Level Agreement, Continuous Delivery, Safety Culture, Network Monitoring
Google Cloud
Skills you'll gain: Dataflow, Google Cloud Platform, Data Pipelines, Serverless Computing, Real Time Data, Dashboard, Identity and Access Management, Big Data, Data Visualization Software, Data Integration, Cloud Security, Performance Tuning, MLOps (Machine Learning Operations), CI/CD, Data Processing, Data Warehousing, Artificial Intelligence and Machine Learning (AI/ML), Application Performance Management, Debugging, Cloud Computing
Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Cloud Infrastructure, Load Balancing, System Monitoring, Kubernetes, Network Performance Management, Network Monitoring, Cloud Computing Architecture, Containerization, Network Architecture, Network Security, Cloud Storage, Cloud Applications, Cloud Services, Identity and Access Management, Network Routing, Virtual Private Networks (VPN), Network Troubleshooting
Skills you'll gain: Data Ethics, Data Analysis, Data Security, Google Sheets, Databases, Data Storage, Data Quality, Data Integrity, Data Management, Data Collection, Data Manipulation, Relational Databases, SQL, Metadata Management, Unstructured Data
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Regulatory Compliance, General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Regulation and Legal Compliance, Communication Planning, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Business Ethics, Internal Controls, Risk Analysis
Skills you'll gain: Software Development Life Cycle, Computing Platforms, Cloud Computing Architecture, Technical Support, Technical Support and Services, Cloud Services, Peripheral Devices, Cybersecurity, Hardware Troubleshooting, IT Service Management, Cloud Security, Cloud Infrastructure, Network Troubleshooting, System Support, Encryption, Data Storage, Professional Networking, Information Technology, Cloud Computing, Interviewing Skills
- Status: Free
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Mathematical Software, Algorithms
University of Pennsylvania
Skills you'll gain: Generative AI, Data Ethics, HR Tech, Data Governance, Big Data, Machine Learning, Data Security, Governance, Business Strategy, Human Resources, Organizational Strategy, Credit Risk, Business Transformation, Risk Management, Tensorflow, Personalized Service, Digital Transformation, Data-Driven Decision-Making, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence
University of Minnesota
Skills you'll gain: Cloud Security, Application Security, Network Security, Cloud Computing, Cybersecurity, Information Systems Security, Infrastructure Security, Public Key Infrastructure, Cryptography, Private Cloud, Vulnerability Assessments, Virtualization, Virtual Machines, Authentications, Encryption, Authorization (Computing)
Google Cloud
Skills you'll gain: Cloud Management, Serverless Computing, Google Cloud Platform, Digital Transformation, Data Governance, Cloud Services, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Cloud Infrastructure, Data Strategy, Artificial Intelligence and Machine Learning (AI/ML), Application Programming Interface (API), Real Time Data, Business Transformation, Data Management, Hybrid Cloud Computing, Data Warehousing, Artificial Intelligence, Cloud Computing, Data Security
In summary, here are 10 of our most popular breach (security exploit) courses
- An Introduction to Programming the Internet of Things (IOT):Â University of California, Irvine
- Introduction to Cybersecurity Fundamentals:Â Coursera Instructor Network
- Preparing for Google Cloud Certification: Cloud DevOps Engineer:Â Google Cloud
- Vertex AI Search for Retail:Â Google Cloud
- Preparing for Google Cloud Certification: Cloud Network Engineer:Â Google Cloud
- Prepare Data for Exploration:Â Google
- Regulatory Compliance:Â University of Pennsylvania
- IBM IT Support:Â IBM
- Cryptography I:Â Stanford University
- AI For Business:Â University of Pennsylvania