Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber exploitation"
- Status: Free
Coursera Project Network
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Real Time Data, Network Analysis
Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Systems Architecture, Zero Trust Network Access, Risk Management Framework, Security Requirements Analysis, Application Security, Computer Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Solution Architecture, Security Strategy, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cyber Security Policies, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Identity and Access Management, Data Security, Network Security, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Scenario Testing, Role-Based Access Control (RBAC), Virtual Machines
- Status: Free
Starweaver
Skills you'll gain: Threat Management, Vulnerability Management, Cybersecurity, Threat Detection, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Vulnerability Scanning, Cyber Attacks, Patch Management
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Cybersecurity, Linux, Security Testing, Linux Commands, Authorization (Computing), Command-Line Interface, Microsoft Windows, Cryptography, Authentications, Unix Commands, Scripting, Virtual Machines, File Management
- Status: Free
Duke University
Skills you'll gain: Payment Systems, FinTech, Financial Regulation, Financial Regulations, Bank Regulations, Banking, Mobile Banking, Banking Services, Regulatory Compliance, Consumer Lending, Asset Management, General Lending, Strategic Partnership, Loans, Regulation and Legal Compliance, Blockchain, Cyber Risk
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Active Directory, Windows PowerShell, Wireless Networks, Microsoft Windows, Linux Commands, Virtual Environment
University of Colorado Boulder
Skills you'll gain: Cyber Governance, Policy Analysis, Regulatory Compliance, Social Justice, Policy Development, Economics, Policy, and Social Studies, Network Infrastructure, Digital Communications, Emerging Technologies, Diversity Equity and Inclusion Initiatives, Economic Development
LearnQuest
Skills you'll gain: Threat Management, Remote Access Systems, Vulnerability Assessments, Application Security, Threat Detection, Security Requirements Analysis, Cyber Security Assessment, Cybersecurity, Security Software, Security Management, Infrastructure Security, Telecommuting, Cyber Risk, Cyber Security Strategy, Cyber Security Policies, Endpoint Security, Security Controls, Virtual Private Networks (VPN), Risk Management Framework, Multi-Factor Authentication
Skills you'll gain: Cybersecurity, Network Security, Cyber Attacks, Cryptography, Threat Modeling, Information Systems Security, Identity and Access Management, Firewall, Encryption, Threat Detection, Public Key Infrastructure, Infrastructure Security, Security Controls, Authentications, Risk Management Framework, Authorization (Computing)
Skills you'll gain: Incident Response, IT Security Architecture, Identity and Access Management, Continuous Monitoring, Network Security, Security Awareness, Information Systems Security, Security Information and Event Management (SIEM), Application Security, Disaster Recovery, Security Controls, Cloud Security, Cyber Security Strategy, Threat Detection, Cyber Governance, Risk Management Framework, Authentications
Skills you'll gain: Threat Modeling, IT Security Architecture, Secure Coding, Application Security, Security Testing, Security Strategy, Information Systems Security, Security Engineering, Software Development Methodologies, Software Development Life Cycle, Systems Architecture, Cyber Security Strategy, Software Testing, Development Testing, Penetration Testing, Business Risk Management, Compliance Management
In summary, here are 10 of our most popular cyber exploitation courses
- Wireshark for Security: Detect Network Anomalies: Coursera Project Network
- Fundamentals of Information System Security Architecture: LearnQuest
- Azure Cybersecurity Solutions And Microsoft Defender : Microsoft
- Deception As a Defense: Starweaver
- The Complete Pentesting and Privilege Escalation Course: Packt
- 핀테크 법률 및 정책: Duke University
- Intermediate Ethical Hacking Hands-on Training: Packt
- When to Regulate? The Digital Divide and Net Neutrality: University of Colorado Boulder
- Fundamentals of Remote Team Security: LearnQuest
- Security Foundations, Threats, and Network Protection: Packt