Filter by
The language used throughout the course, in both instruction and assessments.
Results for "post-exploitation+techniques"
Coursera Project Network
Skills you'll gain: Linux
- Status: Free
- Status: Free
Skills you'll gain: Computer Security Incident Management, Cyberattacks, Network Security
University of Colorado System
Skills you'll gain: Network Security, Security Engineering, Security Software, Software Security, System Security, Computer Programming, Computer Security Incident Management, Databases, SQL, Software Testing
Skills you'll gain: Python Programming
Skills you'll gain: Leadership and Management, Operations Management, Security Engineering, System Security, Computer Security Incident Management, Software Security, Strategy and Operations, Network Security, Security Software, Risk Management
Skills you'll gain: Data Management
University of California, Davis
Skills you'll gain: Security Engineering, Software Security, Security Software, System Security, Java Programming
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Incident Management, Leadership and Management, Security Engineering, System Security, Network Security, Software Security, Cyberattacks, Security Software, Security Strategy
University of Colorado System
Skills you'll gain: Computer Security Incident Management, Cyberattacks, Network Security, Security Engineering, System Security, Computer Networking, Security Software, Computer Security Models, Security Strategy, Software Security
- Status: Free
Skills you'll gain: Computer Security Incident Management
In summary, here are 10 of our most popular post-exploitation+techniques courses
- Metasploit for Beginners: Ethical Penetration Testing:Â Coursera Project Network
- Automation Techniques in RPA:Â UiPath
- Applied ChatGPT for Cybersecurity:Â Infosec
- Hacking and Patching:Â University of Colorado System
- Execution, persistence, privilege escalation and evasion:Â Infosec
- Security Operations and Administration:Â ISC2
- Microsoft Azure Cybersecurity Tools and Solutions:Â Microsoft
- Exploiting and Securing Vulnerabilities in Java Applications:Â University of California, Davis
- Cybersecurity Best Practices:Â Coursera Instructor Network
- Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery :Â ISC2