Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "post-exploitation techniques"
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Assessments, Infrastructure Security, Distributed Denial-Of-Service (DDoS) Attacks, Application Security, Cloud Security, Network Security, Internet Of Things, Wireless Networks, Application Programming Interface (API), Business Logic
University of Michigan
Skills you'll gain: Text Mining, Natural Language Processing, Data Processing, Unstructured Data, Feature Engineering, Data Manipulation, Data Cleansing, Python Programming, Unsupervised Learning, Machine Learning Algorithms, Supervised Learning
Skills you'll gain: Technical Consulting, System Implementation, Test Planning, Solution Delivery, SAP Applications, Technology Roadmaps, Project Implementation, System Testing, Stakeholder Management, Project Closure, End User Training and Support, System Monitoring, System Configuration, Automation, Data Cleansing
University of Colorado Boulder
Skills you'll gain: Power Electronics, Electronic Systems, Electrical Engineering, Engineering Analysis, Simulation and Simulation Software, Systems Analysis, Matlab, Technical Design
DeepLearning.AI
Skills you'll gain: Tensorflow, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Performance Tuning, Machine Learning Methods, Artificial Neural Networks, Applied Machine Learning, Machine Learning, Supervised Learning, Machine Learning Algorithms, Network Architecture, Algorithms, Analysis, Debugging
Skills you'll gain: Penetration Testing, Scripting, Scripting Languages, Python Programming, Cyber Operations, Computer Programming, Email Security, Cybersecurity, Malware Protection, Program Development, TCP/IP
DeepLearning.AI
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Artificial Neural Networks, Applied Machine Learning, Artificial Intelligence, Network Architecture, Machine Learning, Data Processing, Algorithms
DeepLearning.AI
Skills you'll gain: Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Applied Machine Learning, Machine Learning, Debugging, Supervised Learning, Data-Driven Decision-Making, Performance Tuning
Skills you'll gain: ChatGPT, Generative AI, Artificial Intelligence, Data Ethics, OpenAI, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Artificial Neural Networks, Application Deployment, IBM Cloud, Governance, Machine Learning, Business Transformation, Ethical Standards And Conduct, Computer Vision, Self Service Technologies, Information Architecture, Business Process Automation, Software Development Tools, Image Analysis
- Status: Free
Skills you'll gain: Web Scraping, Robotic Process Automation, Email Security, Automation, Business Process Automation, IT Automation, Data Import/Export, Unstructured Data, Spreadsheet Software
Duke University
Skills you'll gain: Presentations, Data Storytelling, Data Presentation, Database Design, MySQL, Relational Databases, SQL, Data Visualization, Business Analytics, Business Metrics, Data Visualization Software, Business Process Improvement, Business Intelligence, Tableau Software, Financial Modeling, Microsoft Excel, Excel Formulas, Business Process, Probability Distribution, Business Risk Management
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Penetration Testing, Application Security, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
In summary, here are 10 of our most popular post-exploitation techniques courses
- Advanced Penetration Techniques:Â Packt
- Applied Text Mining in Python:Â University of Michigan
- Implementing an SAP Solution:Â SAP
- Techniques of Design-Oriented Analysis:Â University of Colorado Boulder
- Improving Deep Neural Networks: Hyperparameter Tuning, Regularization and Optimization:Â DeepLearning.AI
- Advanced Exploitation and Scripting Techniques:Â Packt
- Convolutional Neural Networks:Â DeepLearning.AI
- Structuring Machine Learning Projects:Â DeepLearning.AI
- AI Foundations for Everyone:Â IBM
- Automation Techniques in RPA:Â UiPath