• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Breach Security Exploit

Results for "breach (security exploit)"


  • U

    University of Maryland, College Park

    Breach From Within: Introduction to Insider Risk and Threats

    Skills you'll gain: Risk Management Framework, Threat Management, Cyber Risk, Risk Management, Security Management, MITRE ATT&CK Framework, Security Awareness, Threat Modeling, Operational Risk, Risk Analysis, Business Risk Management, Human Factors (Security), Risk Mitigation, Industrial and Organizational Psychology, Infrastructure Security, Culture Transformation, Cyber Security Strategy, Cyber Security Policies, Organizational Leadership, Organizational Effectiveness

    Beginner · Course · 1 - 3 Months

  • E

    EDUCBA

    Kali Linux: Ethical Hacking & Pentesting

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Brute-force attacks, Cryptography, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Data Import/Export, MySQL, Encryption, Mobile Security, Linux, Linux Administration

    4.8
    Rating, 4.8 out of 5 stars
    ·
    76 reviews

    Beginner · Specialization · 3 - 6 Months

  • C

    Coursera

    Evaluate, Create, and Analyze App Security

    Skills you'll gain: Threat Modeling, Security Testing, Secure Coding, Vulnerability Scanning, Penetration Testing, Vulnerability Management, Dependency Analysis, Application Security, Cyber Security Assessment, Security Requirements Analysis, DevSecOps, Security Strategy, Code Review, Risk Management Framework

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Bug Bounty from Scratch

    Skills you'll gain: Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Penetration Testing, Threat Modeling, Exploit development, Open Web Application Security Project (OWASP), Application Security, Cyber Security Assessment, Patch Management, Cybersecurity, Data Ethics, Cyber Engineering, Technical Communication, Technical Writing

    Beginner · Course · 3 - 6 Months

  • I

    IBM

    IBM Ethical Hacking with Open Source Tools

    Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Intrusion Detection and Prevention, Network Troubleshooting, Anomaly Detection, Information Systems Security, Cyber Security Policies, Network Analysis

    4.6
    Rating, 4.6 out of 5 stars
    ·
    178 reviews

    Intermediate · Professional Certificate · 3 - 6 Months

  • I

    IBM

    Application Security for Developers and DevOps Professionals

    Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle

    4.7
    Rating, 4.7 out of 5 stars
    ·
    248 reviews

    Intermediate · Course · 1 - 4 Weeks

What brings you to Coursera today?

  • E

    EDUCBA

    Python Hacking & Cryptography Mastery

    Skills you'll gain: Cryptography, Encryption, Secure Coding, Brute-force attacks, Cyber Security Assessment, File Management, Python Programming, Programming Principles, Algorithms, Debugging, Scripting, Data Structures, Software Testing, User Interface (UI), Statistical Programming, File I/O, UI Components, Application Development

    4.9
    Rating, 4.9 out of 5 stars
    ·
    14 reviews

    Beginner · Specialization · 1 - 3 Months

  • C

    Coursera

    Harden Workspace Security

    Skills you'll gain: Hardening, Incident Response, Single Sign-On (SSO), Threat Management, Security Management, Security Controls, Continuous Monitoring, User Provisioning, Threat Detection, Security Information and Event Management (SIEM), Identity and Access Management, Enterprise Application Management, IT Automation

    Beginner · Course · 1 - 4 Weeks

  • M

    Macquarie University

    Cyber Security: Security of AI

    Skills you'll gain: AI Security, Responsible AI, Cyber Security Strategy, Cyber Attacks, Cyber Threat Intelligence, Cybersecurity, Data Security, DevSecOps, Security Engineering, Artificial Intelligence, Threat Modeling, Cyber Governance, Artificial Intelligence and Machine Learning (AI/ML), Risk Management, Encryption, Application Programming Interface (API), Machine Learning, Governance, Regulation and Legal Compliance, Applied Machine Learning

    4.6
    Rating, 4.6 out of 5 stars
    ·
    17 reviews

    Beginner · Course · 1 - 3 Months

  • I

    IBM

    Cybersecurity Case Studies and Capstone Project

    Skills you'll gain: Digital Forensics, Incident Response, Penetration Testing, Computer Security Incident Management, Cyber Threat Intelligence, Cybersecurity, Security Management, Threat Detection, Cyber Security Assessment, Vulnerability Assessments, Threat Modeling, Malware Protection, Email Security, AI Security, Exploitation techniques, Network Security, Payment Card Industry (PCI) Data Security Standards, Fraud detection

    4.8
    Rating, 4.8 out of 5 stars
    ·
    1.6K reviews

    Intermediate · Course · 1 - 3 Months

  • C

    Coursera

    Secure Healthcare Data: Encrypt, Audit, Protect

    Skills you'll gain: Data Security, Security Controls, Computer Security Awareness Training, Cybersecurity, Threat Detection, Authorization (Computing), Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Continuous Monitoring

    Beginner · Course · 1 - 4 Weeks

  • C

    Coursera

    Secure AI with Privacy and Access Controls

    Skills you'll gain: Data Loss Prevention, AI Security, Responsible AI, Information Privacy, Data Ethics, Security Controls, Personally Identifiable Information, Data Security, Threat Management, Security Awareness, Security Management, General Data Protection Regulation (GDPR), Authorization (Computing), Incident Response, Cyber Security Policies, Role-Based Access Control (RBAC), Cyber Governance, Governance, Risk Management Framework, Generative AI

    Intermediate · Course · 1 - 4 Weeks

1234…271

In summary, here are 10 of our most popular breach (security exploit) courses

  • Breach From Within: Introduction to Insider Risk and Threats: University of Maryland, College Park
  • Kali Linux: Ethical Hacking & Pentesting: EDUCBA
  • Evaluate, Create, and Analyze App Security: Coursera
  • Bug Bounty from Scratch: Packt
  • IBM Ethical Hacking with Open Source Tools: IBM
  • Application Security for Developers and DevOps Professionals: IBM
  • Python Hacking & Cryptography Mastery: EDUCBA
  • Harden Workspace Security: Coursera
  • Cyber Security: Security of AI: Macquarie University
  • Cybersecurity Case Studies and Capstone Project: IBM

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok