Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "honeypots (computing)"
- Status: Free Trial
Skills you'll gain: Penetration Testing, Scripting, Scripting Languages, Cyber Security Assessment, Python Programming, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Command-Line Interface, Program Development, Network Protocols, Debugging, Software Installation
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Network Analysis
- Status: Free
Skills you'll gain: Data Management, Data Loss Prevention, Data Security, Google Cloud Platform, Personally Identifiable Information, Big Data, Identity and Access Management
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Security Engineering, Cyber Threat Intelligence, Information Systems Security, Software Installation
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Advanced Encryption Standard (AES), Application Security, Public Key Cryptography Standards (PKCS), Secure Coding, Data Security, Web Development, Email Security, PHP (Scripting Language), Algorithms, User Provisioning
- Status: Free Trial
Skills you'll gain: Debugging, Python Programming, Cybersecurity, Cyber Security Assessment, Scripting, Programming Principles, Algorithms, Automation, Computer Programming, Integrated Development Environments, File Management, Data Structures
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cryptography, Public Key Infrastructure, Encryption, Network Security, Cybersecurity, Key Management, Data Security, Security Engineering, Data Encryption Standard, Blockchain, Security Management, Authentications, Wireless Networks, Virtual Private Networks (VPN), Hardware Architecture, Intellectual Property
Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Vulnerability Scanning, Application Security, Vulnerability Assessments, Test Tools, Web Development Tools, Web Applications, SQL
- Status: Free Trial
Skills you'll gain: OAuth, Cloud API, Application Programming Interface (API), Restful API, Security Controls, Application Security, Network Security, Data Security, JSON, Identity and Access Management, Threat Management
- Status: Free Trial
Infosec
Skills you'll gain: Network Analysis, Network Security, Cybersecurity, Threat Detection, Network Monitoring, Anomaly Detection, Network Protocols, TCP/IP
- Status: Free Trial
Microsoft
Skills you'll gain: Generative AI, System Monitoring, Data Ethics, Cybersecurity, Artificial Intelligence, Microsoft Copilot, Prompt Engineering, Image Analysis, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Threat Detection, Emerging Technologies
- Status: Free Trial
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
In summary, here are 10 of our most popular honeypots (computing) courses
- Advanced Exploitation and Scripting Techniques:Â Packt
- Introduction to Intrusion Detection Systems (IDS):Â Johns Hopkins University
- Enabling Sensitive Data Protection Discovery for BigQuery:Â Google Cloud
- Exploitation and Penetration Testing with Metasploit:Â IBM
- Basic Cryptography and Programming with Crypto API:Â University of Colorado System
- Automate Cybersecurity Tasks with Python:Â Google
- Applied Cryptography & Information Security:Â Macquarie University
- Web Hacker's Toolbox - Tools Used by Successful Hackers:Â Packt
- API Security on Google Cloud's Apigee API Platform:Â Google Cloud
- Defensive Python:Â Infosec