Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber exploitation"
Infosec
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Cyber Security Strategy, System Monitoring, Cybersecurity, Cyber Operations, Continuous Monitoring, Network Security, Incident Response, Network Monitoring, Anomaly Detection, Scripting
Universidad de los Andes
Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Cyber Risk, Application Security, Human Factors (Security), Web Servers, Servers, Web Applications
Queen Mary University of London
Skills you'll gain: Cloud Services, Cloud Computing, Cloud Computing Architecture, Contract Negotiation, Cloud Security, Vendor Contracts, Cyber Risk, Infrastructure As A Service (IaaS), Contract Review, Law, Regulation, and Compliance, Contract Management, Regulation and Legal Compliance, Service Level Agreement, Data Security, Data Governance
Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Microsoft Azure, Active Directory, Identity and Access Management, Cloud Management, Cyber Governance, User Accounts, Windows PowerShell, Cloud Infrastructure, Virtual Machines, Command-Line Interface
Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, Infrastructure as Code (IaC), Cyber Security Policies, Security Controls, Security Strategy, Identity and Access Management, Threat Detection
- Status: Free
Infosec
Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Information Systems Security, Application Security, Security Management, Computer Security Incident Management, Network Security, IT Security Architecture, Threat Management, Security Information and Event Management (SIEM), Security Controls, Identity and Access Management, Cryptography, Threat Detection, Cyber Security Policies, Data Security, Encryption, Security Strategy, Incident Management
- Status: Free
EIT Digital
Skills you'll gain: Computational Logic, Markov Model, Verification And Validation, System Testing, Theoretical Computer Science, Mathematical Modeling, Systems Analysis, Software Testing, Statistical Modeling, Probability, Algorithms, Probability Distribution
L&T EduTech
Skills you'll gain: Product Lifecycle Management, Embedded Systems, Manufacturing and Production, Robotic Process Automation, Manufacturing Processes, Computer-Aided Design, Automation, Internet Of Things, Production Process, Process Analysis, Cyber Engineering, Digital Transformation, Manufacturing Operations, System Programming, C (Programming Language), Enterprise Resource Planning, Industrial Engineering, Geometric Dimensioning And Tolerancing, Process Control, Electronic Systems
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
Kennesaw State University
Skills you'll gain: Security Management, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Governance, Business Risk Management, Law, Regulation, and Compliance, Information Management, Cybersecurity, Business Ethics, Performance Measurement, Compliance Management, Governance, Cyber Risk, Organizational Strategy
Skills you'll gain: MITRE ATT&CK Framework, Network Security, Cybersecurity, Cyber Operations, Python Programming, Data Access, Authorization (Computing), Authentications, Scripting, Scripting Languages, Computer Programming, User Accounts
Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Information Systems Security, Cybersecurity, Cloud Security, Cyber Attacks, Intrusion Detection and Prevention, Computer Networking, Data Security, Security Controls
In summary, here are 10 of our most popular cyber exploitation courses
- Python for Active Defense:Ā Infosec
- Vulnerabilidades y pruebas de penetraciĆ³n:Ā Universidad de los Andes
- Cloud Computing Law: Transactions:Ā Queen Mary University of London
- Manage Identities and Governance in Azure:Ā Whizlabs
- Strategies for Cloud Security Risk Management:Ā Google Cloud
- CompTIA Security+ 701:Ā Infosec
- Quantitative Model Checking:Ā EIT Digital
- Digital Technology in Manufacturing:Ā L&T EduTech
- Security Concepts and Practices:Ā ISC2
- The Business of Cybersecurity Capstone:Ā Kennesaw State University