Filter by
The language used throughout the course, in both instruction and assessments.
Results for "post-exploitation+techniques"
Coursera Project Network
Skills you'll gain: Marketing Analytics, Social Media Marketing, Business Marketing, Digital Marketing, Marketing Channel, Social Media Management, Customer Engagement, Gmail, Marketing Strategy and Techniques, Target Audience, Content Creation, Customer Relationship Building
- Status: Free
Eindhoven University of Technology
Skills you'll gain: Process Analysis, Process Improvement, Business Process Management, Data Mining, Business Process Modeling, Process Optimization, Data Processing, Operational Analysis, Data Analysis, Real Time Data, Data Science, Verification And Validation, Algorithms
Duke University
Skills you'll gain: Object Oriented Programming (OOP), Java, Hypertext Markup Language (HTML), Software Design, Data Structures, Debugging, Web Design and Development, Software Engineering, Cryptography, Cascading Style Sheets (CSS), Web Development, Programming Principles, Javascript, Encryption, Algorithms, Program Development, Web Applications, Front-End Web Development, Statistical Analysis, Computer Programming
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Google
Skills you'll gain: Scripting, Python Programming, Computer Programming, Algorithms, Problem Management, Data Structures, Debugging, Development Environment
University of California, Santa Cruz
Skills you'll gain: C++ (Programming Language), Debugging, C (Programming Language), Object Oriented Programming (OOP), Object Oriented Design, Software Design Patterns, Programming Principles, Data Structures, Computer Programming, Algorithms, Command-Line Interface, Software Design, Graph Theory, Computer Science, Program Development, Computational Thinking, Artificial Intelligence, Software Technical Review, File Management
DeepLearning.AI
Skills you'll gain: Computer Vision, Deep Learning, Image Analysis, Natural Language Processing, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Tensorflow, Supervised Learning, Keras (Neural Network Library), Artificial Intelligence, Applied Machine Learning, PyTorch (Machine Learning Library), Machine Learning, Debugging, Performance Tuning, Machine Learning Methods, Python Programming, Data-Driven Decision-Making, Text Mining, Network Architecture
- Status: Free
Pontificia Universidad Católica de Chile
Skills you'll gain: Telephone Skills, Greeting Customers, Vocabulary, Verbal Communication Skills, Business Correspondence, Interpersonal Communications, Business Communication, Taking Meeting Minutes, Grammar, Language Learning, Scheduling
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
University of California, Santa Cruz
Skills you'll gain: Go (Programming Language), Debugging, C (Programming Language), Data Structures, C++ (Programming Language), Object Oriented Programming (OOP), Programming Principles, Computer Programming, Unit Testing, Algorithms, Command-Line Interface, Program Development, Computer Science, Software Testing, File Systems, Computational Thinking, Integration Testing, Software Technical Review, System Programming, File Management
In summary, here are 10 of our most popular post-exploitation+techniques courses
- Small Business Marketing Using YouTube: Coursera Project Network
- Process Mining: Data science in Action: Eindhoven University of Technology
- Java Programming and Software Engineering Fundamentals: Duke University
- Application Security for Developers and DevOps Professionals: IBM
- Google Cybersecurity: Google
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Crash Course on Python: Google
- Coding for Everyone: C and C++: University of California, Santa Cruz
- Deep Learning: DeepLearning.AI
- English for Common Interactions in the Workplace: Basic Level: Pontificia Universidad Católica de Chile