Filter by
The language used throughout the course, in both instruction and assessments.
Results for "breach+(security+exploit)"
Skills you'll gain: Python Programming, Computer Programming
New York University
Skills you'll gain: Cyberattacks, Security Engineering
New York University
Skills you'll gain: Computer Security Models, Cryptography, Cyberattacks, Security Engineering, Security Software, Algorithms, Computational Thinking, Network Security, Security Strategy, System Security
University of California, Davis
Skills you'll gain: Security Engineering, Computer Networking, Cryptography, Network Security
Royal Holloway, University of London
LearnKartS
Edureka
Skills you'll gain: Data Analysis
University of Colorado System
Skills you'll gain: Cyberattacks, Network Security, Security Engineering, Software Security, Computer Networking, Computer Security Incident Management, System Security, Cloud Computing, Computer Security Models, Operating Systems
Coursera Project Network
Skills you'll gain: Linux
University of Colorado System
Skills you'll gain: Computer Security Incident Management, Cyberattacks, Network Security, Security Engineering, System Security, Computer Networking, Security Software, Computer Security Models, Security Strategy, Software Security
University of California, Davis
Skills you'll gain: Security Engineering, Software Security, Security Software, System Security, Java Programming
LearnKartS
Skills you'll gain: Cryptography
In summary, here are 10 of our most popular breach+(security+exploit) courses
- Advanced Python - Reconnaissance:Â Infosec
- Introduction to Cyber Attacks:Â New York University
- Cyber Attack Countermeasures:Â New York University
- Identifying Security Vulnerabilities:Â University of California, Davis
- Cybercrime:Â Royal Holloway, University of London
- System and Network Security:Â LearnKartS
- Gen AI in Cybersecurity:Â Edureka
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Metasploit for Beginners: Ethical Penetration Testing:Â Coursera Project Network
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System