Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber exploitation"
Kennesaw State University
Skills you'll gain: Network Security, Security Management, Firewall, Cyber Attacks, Network Monitoring, Cybersecurity, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, Continuous Monitoring, TCP/IP, Intrusion Detection and Prevention, Threat Detection, Mobile Security, Cryptography, Encryption
Skills you'll gain: NIST 800-53, Risk Management Framework, Cyber Risk, Federal Information Security Management Act, Cybersecurity, Risk Management, Security Management, Cyber Governance, Cyber Security Strategy, Operational Risk, Governance Risk Management and Compliance, Security Controls, Continuous Monitoring, Infrastructure Security, Cyber Security Assessment, Enterprise Risk Management (ERM), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Endpoint Security, Threat Detection, Incident Response
University of Maryland, College Park
Skills you'll gain: Application Security, Secure Coding, Security Engineering, Vulnerability Assessments, Security Testing, Cybersecurity, Threat Modeling, Security Controls, Software Development, Systems Design
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Law, Regulation, and Compliance, Regulation and Legal Compliance, Emerging Technologies, Cyber Governance, Market Dynamics, E-Commerce, Political Sciences, Automation, Digital Transformation, Technology Strategies, Public Administration, Data Governance, FinTech, Complex Problem Solving, Governance, Economics, Algorithms, Artificial Intelligence
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Data Security, Cloud Applications, Cloud Services, Application Security, Authorization (Computing), Cyber Risk, Secure Coding, Cloud Storage, Personally Identifiable Information, DevSecOps, General Data Protection Regulation (GDPR), Network Security, Information Privacy, Continuous Monitoring, Cloud Computing, Cybersecurity
Kennesaw State University
Skills you'll gain: Incident Response, Contingency Planning, Disaster Recovery, Computer Security Incident Management, Security Management, Crisis Management, Cybersecurity, Business Continuity, Cyber Attacks, Risk Analysis, Business Risk Management, Data Storage
FAIR Institute
Skills you'll gain: Risk Analysis, Cyber Risk, Risk Appetite, Cyber Governance, Risk Modeling, Risk Management, Regulatory Compliance, Cybersecurity, Governance, Threat Management, Enterprise Risk Management (ERM), Operational Risk, Continuous Monitoring, Strategic Decision-Making, Insurance, Compliance Management, Security Management, Cyber Security Strategy, Business Risk Management, Business Communication
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Threat Detection, Information Privacy, Safety and Security, Multi-Factor Authentication
Universidad de los Andes
Skills you'll gain: Cryptography, Security Requirements Analysis, Human Factors (Security), Encryption, Data Security, Security Management, Personally Identifiable Information, Threat Management, ISO/IEC 27001, Information Assurance, Cyber Attacks, Cybersecurity, Security Awareness, Law, Regulation, and Compliance
Skills you'll gain: Penetration Testing, Security Testing, Open Web Application Security Project (OWASP), Application Security, Test Tools, Vulnerability Assessments, Web Development Tools, Cybersecurity, Web Applications, SQL
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection, Data Sharing
In summary, here are 10 of our most popular cyber exploitation courses
- Managing Network Security:Â Kennesaw State University
- Cybersecurity Risk Management Framework:Â Infosec
- Cybersecurity Solutions and Microsoft Defender:Â Microsoft
- Cybersecurity Capstone Project:Â University of Maryland, College Park
- Digital Governance:Â Erasmus University Rotterdam
- Cybersecurity in the Cloud:Â University of Minnesota
- Managing Cybersecurity Incidents and Disasters:Â Kennesaw State University
- Cyber Risk Management for Executives:Â FAIR Institute
- Cybersecurity: What to Do When You Are a Victim:Â Kennesaw State University
- Principios y Regulaciones de Seguridad de la Información: Universidad de los Andes