Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber exploitation"
- Status: Free
Amazon Web Services
Skills you'll gain: Data Governance, AWS Identity and Access Management (IAM), Cloud Security, Amazon Web Services, Cyber Governance, AWS SageMaker, Information Systems Security, Security Controls, IT Security Architecture
Skills you'll gain: Cyber Operations, Cybersecurity, Command-Line Interface, Scripting, Python Programming, Data Access, Network Security, System Monitoring, User Accounts, Scripting Languages, System Programming
Skills you'll gain: Threat Modeling, Vulnerability Assessments, Risk Analysis, Personally Identifiable Information, Risk Management, Risk Control, IT Management, Risk Appetite, Compliance Reporting, Information Technology Architecture, Vulnerability Management, Business Continuity, General Data Protection Regulation (GDPR), Business Risk Management, Operational Risk, Information Privacy, Risk Management Framework, Risk Mitigation, Cyber Security Assessment, Information Technology
Board Infinity
Skills you'll gain: Organizational Change, Process Optimization, Robotic Process Automation, Internet Of Things, Manufacturing Operations, Manufacturing Processes, Manufacturing and Production, Cloud Computing, Workforce Development, Change Management, Augmented and Virtual Reality (AR/VR), Innovation, Workforce Planning, Industrial Engineering, Production Process, 3D Modeling, Cybersecurity, Automation, Emerging Technologies, Market Opportunities
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Zero Trust Network Access, Application Deployment, Network Protocols, Identity and Access Management, Software Installation, Infrastructure Architecture, Solution Architecture, Linux
Skills you'll gain: Incident Response, Data Centers, DevSecOps, Continuous Monitoring, System Monitoring, Threat Detection, Infrastructure Security, Microsoft Servers, IT Security Architecture, Information Technology Operations, Security Management, Payment Card Industry (PCI) Data Security Standards, Windows Servers, Microsoft Windows, IT Infrastructure, Systems Administration, Security Information and Event Management (SIEM), Security Testing, Disaster Recovery, IT Automation
Skills you'll gain: Manufacturing Processes, Computer-Aided Design, Automation, Internet Of Things, Process Analysis, Digital Transformation, Manufacturing Operations, Production Process, Industrial Engineering, Geometric Dimensioning And Tolerancing, Engineering Tolerance, Simulation and Simulation Software, Network Infrastructure, Information Technology, Product Lifecycle Management, 3D Modeling, Emerging Technologies, Cloud Computing
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Security Strategy, Intrusion Detection and Prevention, Threat Management, Cybersecurity, Continuous Monitoring, Security Information and Event Management (SIEM), Technical Communication
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Server Side, Vulnerability Assessments
LearnQuest
Skills you'll gain: Blockchain, Risk Management, Enterprise Risk Management (ERM), Risk Analysis, Business Risk Management, Governance Risk Management and Compliance, Interoperability, Cyber Risk, Security Management, Network Architecture, Systems Architecture, Governance, Solution Architecture, Information Technology Architecture, Application Security, Project Documentation, Technical Documentation, Cryptography, Data Storage, Data Architecture
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Cyber Attacks, Threat Modeling, Risk Analysis, Application Security, Vulnerability Assessments, Network Security, Threat Detection, Data Security, Artificial Intelligence, Risk Mitigation, Generative AI, Natural Language Processing
Edureka
Skills you'll gain: AWS Identity and Access Management (IAM), Cloud Security, Threat Detection, Network Security, Incident Response, Identity and Access Management, Computer Security Incident Management, Amazon Web Services, Threat Management, IT Security Architecture, Data Security, Security Strategy, Data Loss Prevention, Application Security, Cloud Standards, Cyber Attacks, Security Controls, Cloud Computing, Intrusion Detection and Prevention, Security Management
In summary, here are 10 of our most popular cyber exploitation courses
- Security, Compliance, and Governance for AI Solutions:Â Amazon Web Services
- Establishing Command-and-Control and Finding Credentials:Â Infosec
- CRISC: Certified in Risk and Information Systems Control:Â Packt
- Advances in Manufacturing Technology:Â Board Infinity
- Check Point Jump Start: Harmony Endpoint Security:Â Check Point Software Technologies Ltd.
- Data Center Security Management with Microsoft System Center:Â EDUCBA
- Digital Manufacturing: Introduction and Smart Design:Â L&T EduTech
- Advanced Threat Hunting and Incident Response:Â LearnQuest
- Software Security for Web Applications:Â Codio
- Blockchain Solution Architecture:Â LearnQuest