Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Cybersecurity, Virtual Private Networks (VPN), Network Protocols, TCP/IP, Encryption, General Networking, Computer Networking, Command-Line Interface, Network Analysis
Skills you'll gain: Penetration Testing, Scenario Testing, Cybersecurity, Vulnerability Assessments, Vulnerability Scanning, Linux, Web Services, Command-Line Interface, Cryptography, File Management, Authorization (Computing), Microsoft Windows, Authentications, Shell Script, Virtual Machines
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Cybersecurity, Cyber Threat Intelligence, Security Management, Security Awareness, Data Ethics, Data Security, Personally Identifiable Information, Technical Communication, Artificial Intelligence
- Status: Free Trial
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
- Status: NewStatus: Free Trial
Skills you'll gain: Bash (Scripting Language), Network Monitoring, System Configuration, Automation, Virtual Machines
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Web Applications, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Application Security, Web Servers, Content Management Systems, Application Programming Interface (API), Authorization (Computing), Databases
- Status: NewStatus: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Vulnerability Management, Security Information and Event Management (SIEM), Cyber Operations, Event Monitoring, Cyber Threat Hunting, Intrusion Detection and Prevention, Cyber Threat Intelligence, Enterprise Security, Threat Detection, Data Loss Prevention, Security Controls, Network Security, Network Monitoring
Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Security Testing, Security Controls, Virtual Environment, Cybersecurity, Virtual Machines, Technical Writing, Web Applications, Technical Documentation, Linux
- Status: Free Trial
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Identity and Access Management, Web Applications, Authorization (Computing), Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Server Side, Vulnerability Assessments, Security Strategy
- Status: Free Trial
Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, Generative AI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Prompt Engineering, Natural Language Processing, Anomaly Detection, Vulnerability Management, Artificial Intelligence
- Status: Free Trial
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Encryption, Data Integrity
Skills you'll gain: Penetration Testing, Threat Modeling, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Security Testing, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript
In summary, here are 10 of our most popular breach (security exploit) courses
- Security & Ethical Hacking: Attacking the Network:Â University of Colorado Boulder
- The Complete Pentesting and Privilege Escalation Course:Â Packt
- Put It to Work: Prepare for Cybersecurity Jobs:Â Google
- Assets, Threats, and Vulnerabilities:Â Google
- Ethical Hacking with Kali Linux:Â IBM
- Hands-On Web App Pentesting:Â Packt
- Into the Trenches: Security Operations Center :Â EC-Council
- Offensive Hacking Unfolded - Become a Pro Pentester:Â Packt
- Software Security for Web Applications:Â Codio
- Generative AI: Boost Your Cybersecurity Career :Â IBM