Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "os vulnerability exploitation and mitigation"
- Status: NewStatus: Preview
University of Cambridge
Skills you'll gain: Intellectual Property, Law, Regulation, and Compliance, Medical Privacy, Legal Strategy, Regulation and Legal Compliance, Legal Research, Life Sciences, Legal Proceedings, Healthcare Ethics, Criminal Investigation and Forensics, Civil Law, Emerging Technologies
- Status: Free Trial
Skills you'll gain: Linux Commands, Bash (Scripting Language), Shell Script, File Management, Unix Shell, Linux, Unix Commands, Linux Servers, Command-Line Interface, Scripting Languages, Unix, Operating Systems, Network Protocols, OS Process Management, Automation, Software Installation
- Status: Preview
Yale University
Skills you'll gain: Negotiation, Contract Negotiation, Conflict Management, Mediation, Leadership, Communication, Persuasive Communication, Influencing, Relationship Building, Collaboration, Game Theory, Strategic Decision-Making
- Status: Free Trial
Stanford University
Skills you'll gain: Algorithms, Graph Theory, Data Structures, Theoretical Computer Science, Computational Thinking, Analysis, Computer Science, Probability & Statistics, Probability
- Status: Preview
Lund University
Skills you'll gain: Social Justice, Community Development, Community Organizing, Environmental Policy, Mitigation, Environment, Environmental Resource Management, Systems Thinking, Visionary, Environmental Science, Research, Finance, Innovation, Strategic Partnership, Governance, Collaboration
- Status: Free Trial
Skills you'll gain: Data Structures, Algorithms, Software Visualization, Pseudocode, Programming Principles, Computational Thinking, Computer Science, Technical Communication, Computational Logic, Program Development, Communication
- Status: Free Trial
Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN), Encryption
- Status: Preview
McMaster University
Skills you'll gain: Lifelong Learning, Willingness To Learn, Learning Strategies, Growth Mindedness, Mentorship, Adaptability, Professional Development, Personal Development, Productivity, Open Mindset, Resilience, Stress Management, Overcoming Obstacles, Curiosity, Cognitive flexibility
- Status: Preview
Utrecht University
Skills you'll gain: Lobbying, Social Justice, Political Sciences, Socioeconomics, Tax Laws, Social Sciences, Economics, Commercial Laws, Policy Analysis, Governance, International Finance
- Status: Free Trial
Rice University
Skills you'll gain: Anatomy, Orthopedics, Kinesiology, Neurology, Medical Terminology, Biochemistry, Biology, Chemistry, Physical Therapy, Pathology, Molecular, Cellular, and Microbiology, Pharmacology, Radiography, Life Sciences, Lifelong Learning
- Status: Preview
Rice University
Skills you'll gain: Oral Comprehension, Critical Thinking, Learning Strategies, Active Listening, Literacy, English Language, Vocabulary, Verbal Communication Skills, Grammar, Language Learning, Research, Analytical Skills
- Status: Free Trial
Stanford University
Skills you'll gain: Data Structures, Graph Theory, Algorithms, Bioinformatics, Theoretical Computer Science, Network Model, Network Analysis, Computational Thinking, Analysis, Computer Science, Probability & Statistics, Network Routing, Probability, Operations Research, Design Strategies
In summary, here are 10 of our most popular os vulnerability exploitation and mitigation courses
- Law and Genetics: University of Cambridge
- Hands-on Introduction to Linux Commands and Shell Scripting: IBM
- Introduction to Negotiation: A Strategic Playbook for Becoming a Principled and Persuasive Negotiator: Yale University
- Divide and Conquer, Sorting and Searching, and Randomized Algorithms: Stanford University
- Cities, Climate and Change: Pathways and Opportunities: Lund University
- Coding Interview Preparation: Meta
- Connect and Protect: Networks and Network Security: Google
- Mindshift: Break Through Obstacles to Learning and Discover Your Hidden Potential: McMaster University
- Inequality and Democracy: Utrecht University
- Human Anatomy & Physiology I: Rice University