Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Applications, Cloud Services, Application Deployment, Virtual Machines, Security Controls, Cloud Computing, Threat Management, Generative AI, Application Security, Virtual Private Networks (VPN)
- Status: New AI skills
Google
Skills you'll gain: Threat Modeling, Network Security, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Stakeholder Communications, Intrusion Detection and Prevention, Cyber Threat Intelligence, Threat Management, Cybersecurity, Network Protocols, Vulnerability Assessments, Network Architecture, Event Monitoring, Operating Systems, File Systems, Security Controls, Debugging, Python Programming
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Skills you'll gain: Network Security, Incident Response, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Configuration Management, Cybersecurity, Security Awareness, Security Management, Computer Security Incident Management, Cyber Attacks, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)
- Status: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Network Security, Information Systems Security, Cybersecurity, Application Security, Encryption, Security Controls, Cyber Attacks, Security Awareness, Data Security, Cryptography, Threat Modeling, Security Management, Network Administration, Computer Security Awareness Training, Information Assurance, Wireless Networks, Hardening, Firewall, Malware Protection, Authentications
- Status: New AI skills
Google
Skills you'll gain: Computer Networking, Package and Software Management, Network Security, Network Troubleshooting, Systems Administration, Cloud Infrastructure, IT Infrastructure, TCP/IP, Information Systems Security, File Systems, Microsoft Windows, Network Architecture, Desktop Support, Lightweight Directory Access Protocols, Cybersecurity, Application Security, Computer Hardware, Technical Support, Software Installation, Operating Systems
- Status: Free
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security Awareness Training, Threat Detection, General Networking, Vulnerability
Skills you'll gain: Cybersecurity, Encryption, Cyber Attacks, Email Security, Computer Security Awareness Training, Security Awareness, Data Security, Information Systems Security, Malware Protection, Authentications, Authorization (Computing), Security Controls, Hardening, Identity and Access Management, Multi-Factor Authentication, Browser Compatibility
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
- Status: AI skills
Skills you'll gain: Istio, Node.JS, Software Development Life Cycle, Kubernetes, Unit Testing, Object-Relational Mapping, Cloud Computing Architecture, Server Side, Application Deployment, React Redux, Cloud Services, Cloud-Native Computing, OpenShift, Git (Version Control System), Full-Stack Web Development, HTML and CSS, Cloud Computing, Jupyter, Generative AI, Interviewing Skills
In summary, here are 10 of our most popular breach (security exploit) courses
- Security in Google Cloud:Â Google Cloud
- Google Cybersecurity:Â Google
- IT Fundamentals for Cybersecurity:Â IBM
- Certified in Cybersecurity:Â ISC2
- Microsoft Cybersecurity Analyst:Â Microsoft
- IBM Cybersecurity Analyst:Â IBM
- IT Security: Defense against the digital dark arts :Â Google
- Google IT Support:Â Google
- Cybersecurity for Everyone:Â University of Maryland, College Park
- Introduction to Cybersecurity Essentials:Â IBM