Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber exploitation"
EIT Digital
Skills you'll gain: Cybersecurity, Threat Modeling, Information Systems Security, Security Management, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Security Policies, Threat Management, Cyber Risk, Threat Detection, Cyber Security Assessment, Network Security, Application Security, Risk Management, Security Controls, Security Awareness, Data Security, Information Privacy, Vulnerability Assessments, Business Economics
Skills you'll gain: Vulnerability Scanning, Threat Modeling, Vulnerability Management, Vulnerability Assessments, Secure Coding, Security Testing, Threat Management, Cyber Governance, Cyber Security Policies, Cyber Security Assessment, Cyber Attacks, Application Security, Open Web Application Security Project (OWASP), Threat Detection, Cybersecurity, Risk Management Framework, Security Management, Security Controls, Code Review, Incident Response
Google Cloud
Skills you'll gain: Cyber Operations, Security Management, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Threat Management, DevOps, Threat Detection, Cyber Security Assessment, Incident Response, Site Reliability Engineering, Digital Transformation, Agile Methodology, Automation
Kennesaw State University
Skills you'll gain: Cybersecurity, Interviewing Skills, Cyber Security Strategy, Cyber Risk, Cyber Security Policies, Organizational Structure, Cyber Governance, Workforce Development, Security Management, Professional Networking
FAIR Institute
Skills you'll gain: Cyber Risk, Risk Appetite, Cyber Governance, Risk Management, Regulatory Compliance, Risk Analysis, Enterprise Risk Management (ERM), Operational Risk, Cyber Security Strategy, Insurance, Compliance Management, Business Communication, Technical Communication, Strategic Communication, Business Reporting, Governance
Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Security Strategy, Cyber Security Assessment, Security Controls, Incident Response, Data Storage, Vulnerability Assessments, Patch Management
- Status: Free
DeepLearning.AI
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Security Testing, Vulnerability Management, Threat Modeling, Cyber Security Assessment, Application Security
Skills you'll gain: Vulnerability Assessments, Risk Management, Continuous Monitoring, Operational Risk, Threat Management, Intrusion Detection and Prevention, Cyber Risk, Vulnerability Management, Security Controls, Enterprise Risk Management (ERM), Risk Mitigation, Risk Analysis, Compliance Management, Security Information and Event Management (SIEM), Technical Communication, Auditing
- Status: Free
Coursera Project Network
Skills you'll gain: Linux Commands, Linux, TCP/IP, Scripting, Shell Script, Network Monitoring, Network Analysis, Network Security, Network Protocols
Kennesaw State University
Skills you'll gain: Cyber Governance, Risk Management Framework, Risk Analysis, Risk Management, Threat Detection, Threat Management, Business Risk Management, Cyber Risk, Security Management, Governance, Cybersecurity, Cyber Security Strategy, Security Strategy, Asset Management
- Status: Free
Coursera Project Network
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Verification And Validation, Cyber Security Assessment, Linux Commands, Command-Line Interface, Virtual Machines
Skills you'll gain: Hardware Troubleshooting, Customer Service, Network Troubleshooting, Customer Relationship Building, Computer Security Incident Management, Incident Response, Professional Development, Continuous Improvement Process, Cybersecurity, Desktop Support, Performance Metric, Service Improvement, Computer Hardware, Cyber Attacks, Technical Support, Customer Complaint Resolution, Digital Transformation, Operating Systems, Lifelong Learning, System Support
In summary, here are 10 of our most popular cyber exploitation courses
- Becoming a Cybersecurity Consultant:Â EIT Digital
- Vulnerability Types and Concepts:Â Packt
- Modern Security Operations:Â Google Cloud
- Cybersecurity Job Search and Interviews: Getting Started:Â Kennesaw State University
- Executive Communication and Governance:Â FAIR Institute
- Digital Safety and Security:Â Arizona State University
- Red Teaming LLM Applications:Â DeepLearning.AI
- Risk Identification, Monitoring, and Analysis:Â ISC2
- Analyze Network Traffic with TCPDump: Build a Logging Tool:Â Coursera Project Network
- Implementing a Risk Management Framework :Â Kennesaw State University