Filter by
The language used throughout the course, in both instruction and assessments.
Results for "breach+(security+exploit)"
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Encryption, Application Security, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Vulnerability Management, Personally Identifiable Information, Web Applications, SQL
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Application Security, Vulnerability Assessments, Vulnerability Management, Extensible Markup Language (XML), Scripting, Cybersecurity
Skills you'll gain: Penetration Testing, Scripting, Scripting Languages, Python Programming, Cyber Security Assessment, Cyber Operations, Computer Programming, Email Security, Cybersecurity, Malware Protection, Command-Line Interface, Program Development, TCP/IP
- Status: Free
Universidades Anáhuac
Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Human Factors (Security)
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Cybersecurity, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
New York University
Skills you'll gain: Cyber Attacks, Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cybersecurity, IT Security Architecture, Cloud Security, NIST 800-53, Cyber Threat Intelligence, Hybrid Cloud Computing, Cloud Computing Architecture, Payment Card Industry (PCI) Data Security Standards, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Data Integrity
Skills you'll gain: Threat Management, Vulnerability Assessments, Incident Response, Computer Security Incident Management, IT Security Architecture, Disaster Recovery, Vulnerability Management, Hardening, Public Key Infrastructure, Risk Management, Compliance Management, Governance Risk Management and Compliance, Network Security, Security Engineering, Infrastructure Security, Regulatory Requirements, Cryptographic Protocols, Information Systems Security, Software-Defined Networking, Application Security
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, Application Security, IT Security Architecture, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cybersecurity, Cyber Risk, Threat Management, Security Management, Vulnerability Assessments, Threat Detection, Governance, Cyber Security Strategy, Risk Management, Security Awareness, Cyber Operations, Cyber Security Policies, Computer Security Incident Management, Human Factors (Security)
LearnQuest
Skills you'll gain: Continuous Monitoring, Cloud Security, Disaster Recovery, Network Security, Cloud Services, Security Strategy, Security Controls, Cloud Computing Architecture, Cloud Computing, Hybrid Cloud Computing, Infrastructure Security, Cybersecurity, Data Security, Security Management, Threat Detection, Identity and Access Management
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Cybersecurity, Dependency Analysis, Docker (Software), Git (Version Control System)
In summary, here are 10 of our most popular breach+(security+exploit) courses
- Identifying Security Vulnerabilities: University of California, Davis
- Previous OWASP Risks: Infosec
- Advanced Exploitation and Scripting Techniques: Packt
- Digital Shield: Cybersecurity for Data and System Protection: Universidades Anáhuac
- Hacking and Patching: University of Colorado System
- Enterprise and Infrastructure Security: New York University
- CompTIA CASP+ (CAS-004): Packt
- Cyber Security Technologies: Illinois Tech
- Cybersecurity Foundations for Risk Management: Kennesaw State University
- Securing Cloud and Hybrid Networks: LearnQuest