Filter by
The language used throughout the course, in both instruction and assessments.
Results for "penetration+test"
Coursera Project Network
Skills you'll gain: Postman API Platform, OAuth, Application Programming Interface (API), API Design, Performance Testing, Security Testing, Software Testing, Restful API, Test Tools, Authentications, Authorization (Computing)
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Endpoint Security, Threat Detection, Incident Response
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Security Controls, Vulnerability Assessments, Incident Response, Intrusion Detection and Prevention, Malware Protection, Network Architecture
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security), Personally Identifiable Information
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection, Data Sharing
Microsoft
Skills you'll gain: Virtual Private Networks (VPN), Cybersecurity, Multi-Factor Authentication, Authentications, Information Systems Security, Network Security, Technical Support and Services, Information Privacy, Servers, Cloud Computing, Cloud Security, Network Administration, Encryption, Identity and Access Management, Mac OS
University of Colorado System
Skills you'll gain: Computer Security Incident Management, Cyberattacks, Network Security, Security Engineering, System Security, Computer Networking, Security Software, Computer Security Models, Leadership and Management, Software Security
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
Skills you'll gain: Linux Commands, Linux, Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Command-Line Interface, Security Testing, Scripting, Vulnerability Assessments, Scripting Languages, Intrusion Detection and Prevention, Cyber Security Assessment, General Networking, Python Programming, Network Security, Cybersecurity, Application Security, Firewall, Web Applications, Cyber Operations
Skills you'll gain: Cloud Computing
Microsoft
Skills you'll gain: Microsoft Azure, Application Security, Cloud Security, Infrastructure Security, Kubernetes, Network Security, Security Engineering, Firewall, Endpoint Security, Identity and Access Management, Infrastructure As A Service (IaaS), Role-Based Access Control (RBAC), Cloud Services, Virtual Machines, Containerization, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Private Networks (VPN), Encryption
In summary, here are 10 of our most popular penetration+test courses
- API Testing a real web application via Postman: Coursera Project Network
- Cybersecurity Solutions and Microsoft Defender: Microsoft
- Cybersecurity Tools and Technologies: Microsoft
- Cybersecurity Assessment: CompTIA Security+ & CYSA+: IBM
- Cyber Threats and Attack Vectors: University of Colorado System
- Proactive Computer Security: University of Colorado System
- Cybersecurity and Privacy: Microsoft
- Detecting and Mitigating Cyber Threats and Attacks: University of Colorado System
- Secure Coding Practices: University of California, Davis
- The Complete Ethical Hacking Bootcamp: Beginner To Advanced: Packt