Filter by
The language used throughout the course, in both instruction and assessments.
Results for "post-exploitation+techniques"
University of California, Santa Cruz
Skills you'll gain: C++ (Programming Language), Go (Programming Language), Debugging, C (Programming Language), Data Structures, Object Oriented Programming (OOP), Object Oriented Design, Software Design Patterns, Programming Principles, Computer Programming, Unit Testing, Algorithms, Command-Line Interface, Program Development, Software Design, Graph Theory, Computer Science, Software Testing, File Systems, Computational Thinking
LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Penetration Testing, Network Security, Malware Protection, Cybersecurity, Cloud Computing, Mobile Security, Application Security, Cyber Attacks, Cyber Security Assessment, Security Testing, Threat Detection, Information Systems Security, Cyber Threat Intelligence, Intrusion Detection and Prevention, Virtualization, Firewall, Vulnerability Assessments, Threat Modeling
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Security Management, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Cyber Attacks, Malware Protection, Email Security, Vulnerability Management, Artificial Intelligence
Skills you'll gain: Extract, Transform, Load, Power BI, Data Integrity, Data Validation, Data Transformation, Data Cleansing, Microsoft Power Platform, Data Storage, Data Analysis, Data Integration, Data Import/Export, Business Intelligence
University of California San Diego
Skills you'll gain: Data Structures, Graph Theory, Algorithms, Debugging, Network Model, Bioinformatics, Advanced Mathematics, Operations Research, Data Storage, Development Testing, Software Testing, Theoretical Computer Science, Computational Thinking, Network Analysis, Programming Principles, Computer Programming, Network Routing, Epidemiology, C++ (Programming Language), Infectious Diseases
Multiple educators
Skills you'll gain: Unit Testing, Data Structures, Event-Driven Programming, Interactive Data Visualization, Java, Java Programming, Object Oriented Programming (OOP), Development Testing, User Interface (UI), Debugging, Software Testing, Cryptography, Computer Programming, Performance Tuning, Encryption, Algorithms, Graphical Tools, Software Engineering, Program Development, Programming Principles
University of Michigan
Skills you'll gain: Text Mining, Natural Language Processing, Data Processing, Unstructured Data, Feature Engineering, Data Manipulation, Data Cleansing, Python Programming, Unsupervised Learning, Machine Learning Algorithms, Supervised Learning
Coursera Project Network
Skills you'll gain: Social Media Content, Social Media, Facebook, Content Creation, Social Media Marketing, Instagram, Data Visualization, Brand Management
Skills you'll gain: Open Web Application Security Project (OWASP), Istio, Software Development Life Cycle, Linux Commands, Unit Testing, Object-Relational Mapping, Application Deployment, Kubernetes, NoSQL, Bash (Scripting Language), MongoDB, Shell Script, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Serverless Computing, Jupyter, Grafana
Coursera Project Network
Skills you'll gain: Finite Element Methods, Engineering Analysis, Simulation and Simulation Software, Simulations, Mechanical Design, Structural Analysis, Engineering Design Process
University of Michigan
Skills you'll gain: Javascript, HTML and CSS, Interactive Design, Web Design and Development, Web Content Accessibility Guidelines, Event-Driven Programming, Web Applications, User Interface (UI), Data Structures, Debugging
EC-Council
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Security Awareness, Cyber Threat Intelligence, Cybersecurity, Intrusion Detection and Prevention, Cyber Attacks, Application Security, Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
In summary, here are 10 of our most popular post-exploitation+techniques courses
- C, Go, and C++: A Comprehensive Introduction to Programming: University of California, Santa Cruz
- Certified Ethical Hacking (v12): LearnKartS
- Cybersecurity Case Studies and Capstone Project: IBM
- Extract, Transform and Load Data in Power BI: Microsoft
- Data Structures and Algorithms: University of California San Diego
- Object Oriented Programming in Java: Duke University
- Applied Text Mining in Python: University of Michigan
- Use Canva to Create Social Media Visuals for Business: Coursera Project Network
- IBM Back-End Development: IBM
- FEM - Linear, Nonlinear Analysis & Post-Processing: Coursera Project Network