• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Lambda Exploitation

Results for "lambda exploitation"


  • Status: New
    New
    Status: Free Trial
    Free Trial
    L

    LearnKartS

    AWS Certified Developer Associate

    Skills you'll gain: Infrastructure as Code (IaC), Amazon Web Services, AWS Identity and Access Management (IAM), Containerization, Application Deployment, Identity and Access Management, CI/CD, Amazon Elastic Compute Cloud, Database Management, Database Administration, AWS CloudFormation, Cloud Development, Amazon DynamoDB, Amazon S3, Amazon CloudWatch, AWS Kinesis, Multi-Factor Authentication, File Systems, Virtual Machines, Virtualization and Virtual Machines

    4.6
    Rating, 4.6 out of 5 stars
    ·
    8 reviews

    Beginner · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Introduction to Penetration Testing and Ethical Hacking

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)

    3.6
    Rating, 3.6 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Information Assurance Analysis

    Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security

    4
    Rating, 4 out of 5 stars
    ·
    8 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Preview
    Preview
    S

    SAE Institute México

    Ethical Hacking

    Skills you'll gain: Exploitation techniques, Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Information Systems Security, Security Testing, General Networking, Network Protocols

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    U

    University of California, Santa Cruz

    لغة البرمجة C++ لمبرمجي اللغة C، الجزء (أ)

    Skills you'll gain: C and C++, C++ (Programming Language), Object Oriented Programming (OOP), C (Programming Language), Algorithms, Programming Principles, Data Structures, Software Design Patterns, Secure Coding, Scaled Agile Framework

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    System Hacking, Malware Threats, and Network Attacks

    Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols

    4.7
    Rating, 4.7 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    C++ 20 Mastery - Pure and Unfiltered

    Skills you'll gain: C++ (Programming Language), Object Oriented Programming (OOP), Programming Principles, Algorithms, Data Structures, Performance Tuning, Debugging

    Advanced · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Illinois Tech

    Cloud: Infrastructure as a Service - Master's

    Skills you'll gain: Infrastructure As A Service (IaaS), Cloud Infrastructure, Cloud Management, Cloud Computing, Disaster Recovery, DevOps, Cloud-Native Computing, Amazon Web Services, Virtualization, Cloud Applications, Serverless Computing, Cloud Security, Continuous Integration, Virtual Machines, Cloud Storage, Capacity Management, Business Continuity, Cost Management

    Build toward a degree

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking Web and AI Systems

    Skills you'll gain: Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Personally Identifiable Information, Business Logic

    Build toward a degree

    Advanced · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Packt

    Python - Complete Python, Django, Data Science and ML Guide

    Skills you'll gain: Predictive Modeling, Django (Web Framework), Data Visualization, Statistical Modeling, Feature Engineering, Application Programming Interface (API), Programming Principles, Relational Databases, Databases, Development Environment, Data Science, Data Cleansing, Animation and Game Design, Authorization (Computing), Scripting Languages, Integrated Development Environments, Software Development Tools, Style Guides, Software Design

    Intermediate · Specialization · 3 - 6 Months

  • P

    Packt

    Intermediate Ethical Hacking Hands-on Training

    Skills you'll gain: Penetration Testing, Metasploit, Open Web Application Security Project (OWASP), Network Protocols, Vulnerability Assessments, Exploitation techniques, Windows PowerShell, Active Directory, Network Security, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free
    Free
    I

    Infosec

    ChatGPT for Offensive Security

    Skills you'll gain: Prompt Engineering, ChatGPT, Open Web Application Security Project (OWASP), Responsible AI, Penetration Testing, Threat Modeling, Cyber Operations, Exploitation techniques, Vulnerability Scanning, Generative AI, Scripting

    4
    Rating, 4 out of 5 stars
    ·
    8 reviews

    Beginner · Course · 1 - 3 Months

1…111213…20

In summary, here are 10 of our most popular lambda exploitation courses

  • AWS Certified Developer Associate: LearnKartS
  • Introduction to Penetration Testing and Ethical Hacking: Johns Hopkins University
  • Information Assurance Analysis: Johns Hopkins University
  • Ethical Hacking: SAE Institute México
  • لغة البرمجة C++ لمبرمجي اللغة CØŒ الجزء (Ø£): University of California, Santa Cruz
  • System Hacking, Malware Threats, and Network Attacks: Packt
  • C++ 20 Mastery - Pure and Unfiltered: Packt
  • Cloud: Infrastructure as a Service - Master's: Illinois Tech
  • Security & Ethical Hacking: Attacking Web and AI Systems: University of Colorado Boulder
  • Python - Complete Python, Django, Data Science and ML Guide: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok