Filter by
The language used throughout the course, in both instruction and assessments.
Results for "system+exploitation"
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Cyber Operations, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Threat Management
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
Skills you'll gain: OS Process Management, Operating Systems, C (Programming Language), System Programming, Virtualization, Virtual Machines, Application Programming Interface (API)
University of Colorado System
Skills you'll gain: Planning, Security Software, System Security, Computer Security Incident Management, Leadership and Management, Data Management, Operating Systems, Risk Management, Strategy and Operations
University of Colorado System
Skills you'll gain: Computer Security, OSI Models, Systems Administration, Virtualization, Network Security, Information Technology, Information Systems Security, Enterprise Security, General Networking, Network Administration, Information Systems, Computer Networking, Virtual Machines, Computer Systems, Data Integrity
Skills you'll gain: Linux Administration, Linux Servers, Red Hat Enterprise Linux, Linux, IBM Cloud, Linux Commands, Virtualization, Systems Administration, Virtual Machines, Cloud Computing, System Monitoring, Software Installation, System Configuration
EIT Digital
Skills you'll gain: Operating Systems, Computer Programming, System Software, Systems Design, C Programming Language Family, Computer Architecture, Computer Programming Tools, Hardware Design, Networking Hardware, System Programming
University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
University of Washington
Skills you'll gain: Big Data, Relational Databases, Database Systems, Databases, Data Science, Data Manipulation, Data Processing, NoSQL, Apache Spark, Analytics, Distributed Computing, Apache Hadoop, SQL, Data Analysis, Data Structures, Query Languages, Cloud Computing, Scalability, Graph Theory, Algorithms
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Cryptography, Security Engineering, Threat Modeling, Authorization (Computing), Encryption, Email Security, Data Integrity, Authentications, Verification And Validation
University of California, Irvine
Skills you'll gain: Systems Development Life Cycle, Agile Methodology, Productivity Software, Network Security, Computer Hardware, Hardware Architecture, Computer Systems, Data Security, Systems Design, Systems Development, Risk Management, System Design and Implementation, TCP/IP, Information Technology, Software Development Methodologies, Data Ethics, Cybersecurity, General Networking, Safety and Security, Information Privacy
University of Colorado Boulder
Skills you'll gain: Stakeholder Engagement, Systems Thinking, Rapport Building, Stakeholder Communications, Community Development, Intercultural Competence, Cultural Sensitivity, Complex Problem Solving, Diversity Awareness, Consultative Approaches, Project Management, Critical Thinking
In summary, here are 10 of our most popular system+exploitation courses
- In the Trenches: Security Operations Center : EC-Council
- Advanced System Security Design: University of Colorado System
- Intro to Operating Systems 1: Virtualization: Codio
- Planning, Auditing and Maintaining Enterprise Systems: University of Colorado System
- Enterprise System Management and Security : University of Colorado System
- Linux System Administration with IBM Power Systems: IBM
- Embedded Hardware and Operating Systems: EIT Digital
- Cyber Security – Technology and Governance: University of London
- Data Manipulation at Scale: Systems and Algorithms: University of Washington
- Design and Analyze Secure Networked Systems: University of Colorado System