Filter by
The language used throughout the course, in both instruction and assessments.
Results for "post-exploitation+techniques"
Coursera Project Network
- Status: Free
Coursera Instructor Network
University of Maryland, College Park
Skills you'll gain: Human Computer Interaction, Software Security, System Security, Systems Design, User Experience, Cyberattacks, Design and Product, Security Engineering, User Research, Interactive Design
Cisco Learning and Certifications
University of California, Davis
Skills you'll gain: Security Engineering, Software Security, Computer Programming, System Security, Security Software, Network Security, Programming Principles, Computer Networking, Cryptography, Software Engineering, Computer Security Models, Java Programming
- Status: Free
Northwestern University
Skills you'll gain: Strategy and Operations, Marketing, Operations Management, Accounting, Cost Accounting, Entrepreneurship, Finance, Market Analysis, Sales, Strategy, Planning
University of Virginia
Skills you'll gain: Entrepreneurship, Leadership and Management, Marketing, Sales, Strategy, Strategy and Operations, Business Design, Research and Design, Planning
Skills you'll gain: Network Security, Security Engineering, System Security, Security Software, Software Security, Cloud Computing, Cloud Applications, Cyberattacks, Software-Defined Networking
Copenhagen Business School
Skills you'll gain: Leadership and Management, Strategy, Strategy and Operations, Business Development, Decision Making, Planning, Business Analysis, Business Transformation, Organizational Development, Product Strategy
Queen Mary University of London
Skills you'll gain: Exploratory Data Analysis, Market Research, Critical Thinking, Data Management, Research and Design, User Experience, Business Communication, Data Analysis, Data Structures, User Research, Experiment
In summary, here are 10 of our most popular post-exploitation+techniques courses
- Security Concepts and Practices:Â ISC2
- FEM - Linear, Nonlinear Analysis & Post-Processing:Â Coursera Project Network
- Introduction to Prompt Injection Vulnerabilities:Â Coursera Instructor Network
- Usable Security:Â University of Maryland, College Park
- Threat Investigation:Â Cisco Learning and Certifications
- Secure Coding Practices:Â University of California, Davis
- Scaling Operations: Linking Strategy and Execution:Â Northwestern University
- Empowering with web3.js: Web3 Applications:Â EDUCBA
- Strategic Planning and Execution:Â University of Virginia
- Systems and Application Security:Â ISC2