Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
- Status: Free Trial
Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cyber Threat Intelligence, Security Testing, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Information Systems Security, Threat Modeling, Security Engineering, DevSecOps, Data Security, Cyber Governance, Artificial Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Risk Management, Encryption, Machine Learning, Application Programming Interface (API), Regulation and Legal Compliance, Governance, Applied Machine Learning
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Unix, Computer Security, Application Security, Vulnerability Assessments, Unix Commands, Microsoft Windows, System Programming, Linux, Debugging, Command-Line Interface, Windows PowerShell, Computer Architecture, OS Process Management
- Status: Free Trial
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Network Security, Wireless Networks, Cybersecurity, Linux, Vulnerability Assessments, Intrusion Detection and Prevention, Command-Line Interface, Linux Commands, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Security Software, Software Installation, File Management, Virtual Machines
- Status: Free Trial
Skills you'll gain: Identity and Access Management, Endpoint Security, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cyber Security Strategy, Secure Coding, Firewall, Application Security, Authentications, Security Controls, Authorization (Computing), Security Information and Event Management (SIEM), Data Governance
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cybersecurity, Network Security, Network Protocols, Network Analysis, Vulnerability Assessments, Scripting, Remote Access Systems, Python Programming, Command-Line Interface
- Status: Free Trial
Coursera Instructor Network
Skills you'll gain: Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Attacks, Threat Modeling, Risk Analysis, Application Security, Vulnerability Assessments, OpenAI, ChatGPT, Security Strategy, Risk Mitigation
- Status: NewStatus: Preview
Coursera Instructor Network
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Cyber Security Strategy, Data Ethics, Cybersecurity, Penetration Testing, Threat Detection, Vulnerability Assessments, Artificial Intelligence, Data Security, Incident Response, Tensorflow, Risk Management Framework, Data Integrity
- Status: Free Trial
Royal Holloway, University of London
Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Threat Modeling, Security Awareness, Social Sciences, Culture, Investigation, Psychology, Survey Creation, Research
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Cybersecurity, Data Ethics, Information Systems Security, Cyber Security Policies, Computer Security, General Data Protection Regulation (GDPR), Vulnerability Management, Vulnerability Assessments, Information Privacy, Technical Writing
- Status: Preview
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
In summary, here are 10 of our most popular breach (security exploit) courses
- Database Essentials and Vulnerabilities:Â IBM
- AI Security: Risks, Defences and Safety:Â Macquarie University
- Security & Ethical Hacking: Attacking Unix and Windows :Â University of Colorado Boulder
- Exploiting and Securing Vulnerabilities in Java Applications:Â University of California, Davis
- Ethical Hacking Foundations & Network Security:Â Packt
- Cybersecurity Architecture:Â IBM
- Exploit Development, Malware, & Defensive Strategies:Â Packt
- Introduction to Prompt Injection Vulnerabilities:Â Coursera Instructor Network
- Cybersecurity Strategies for AI-Driven Organizations:Â Coursera Instructor Network
- Cybercrime:Â Royal Holloway, University of London