Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "post-exploitation techniques"
Skills you'll gain: Technical Consulting, System Implementation, Test Planning, Solution Delivery, SAP Applications, Technology Roadmaps, Project Implementation, System Testing, Stakeholder Management, Project Closure, End User Training and Support, System Monitoring, System Configuration, Automation, Data Cleansing
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Assessments, Infrastructure Security, Distributed Denial-Of-Service (DDoS) Attacks, Application Security, Cloud Security, Network Security, Internet Of Things, Wireless Networks, Application Programming Interface (API), Business Logic
Skills you'll gain: Penetration Testing, Scripting, Scripting Languages, Python Programming, Cyber Operations, Computer Programming, Email Security, Cybersecurity, Malware Protection, Program Development, TCP/IP
L&T EduTech
Skills you'll gain: Geospatial Information and Technology, Spatial Analysis, GIS Software, Spatial Data Analysis, Geographic Information Systems, Geospatial Mapping, Database Management, Database Management Systems, Construction Management, ArcGIS, Relational Databases, Visualization (Computer Graphics), Heat Maps, Civil and Architectural Engineering, Global Positioning Systems, Decision Support Systems, Building Information Modeling, As-Built Drawings, Survey Creation, AutoCAD Civil 3D
EC-Council
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Security Awareness, Cyber Threat Intelligence, Cybersecurity, Intrusion Detection and Prevention, Cyber Attacks, Application Security, Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Mobile Security, Cybersecurity, Cyber Threat Intelligence, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Intrusion Detection and Prevention, Encryption, Network Protocols
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Visualization, Statistical Programming, Ggplot2, Dimensionality Reduction, Data Visualization Software, Data Integration, Knitr, Data Analysis, Data Import/Export, General Science and Research, Data Sharing, Statistical Reporting
Skills you'll gain: ChatGPT, Generative AI, Artificial Intelligence, Data Ethics, OpenAI, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Artificial Neural Networks, Application Deployment, IBM Cloud, Governance, Machine Learning, Business Transformation, Ethical Standards And Conduct, Computer Vision, Self Service Technologies, Information Architecture, Business Process Automation, Software Development Tools, Image Analysis
University of Colorado Boulder
Skills you'll gain: Power Electronics, Electronic Systems, Electrical Engineering, Engineering Analysis, Simulation and Simulation Software, Systems Analysis, Matlab, Technical Design
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
Vanderbilt University
Skills you'll gain: ChatGPT, Creative Problem-Solving, Generative AI, Creative Thinking, Artificial Intelligence, Innovation, Brainstorming, Creativity, Teaching, Interactive Learning, Instructional Strategies, Lesson Planning, Student Engagement, Curiosity, Resourcefulness, Curriculum Planning, Natural Language Processing, Problem Solving, Critical Thinking, Application Development
In summary, here are 10 of our most popular post-exploitation techniques courses
- Implementing an SAP Solution:Â SAP
- Advanced Penetration Techniques:Â Packt
- Advanced Exploitation and Scripting Techniques:Â Packt
- Geospatial Techniques for Engineers:Â L&T EduTech
- Ethical Hacking Essentials (EHE):Â EC-Council
- Advanced Cybersecurity Techniques:Â Johns Hopkins University
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Data Science: Foundations using R:Â Johns Hopkins University
- AI Foundations for Everyone:Â IBM
- Techniques of Design-Oriented Analysis:Â University of Colorado Boulder