Filter by
The language used throughout the course, in both instruction and assessments.
Results for "attack+surface"
Skills you'll gain: Cloud Applications, Cloud API, Application Deployment, API Gateway, Application Programming Interface (API), Cloud Computing, Serverless Computing, Application Security, Web Servers, OpenAI, Artificial Intelligence
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Cyber Attacks, Threat Modeling, Risk Analysis, Application Security, Vulnerability Assessments, Network Security, Threat Detection, Data Security, Artificial Intelligence, Risk Mitigation, Generative AI, Natural Language Processing
Edureka
Skills you'll gain: AWS Identity and Access Management (IAM), Cloud Security, Threat Detection, Network Security, Incident Response, Identity and Access Management, Computer Security Incident Management, Amazon Web Services, Threat Management, IT Security Architecture, Data Security, Security Strategy, Data Loss Prevention, Application Security, Cloud Standards, Cyber Attacks, Security Controls, Cloud Computing, Intrusion Detection and Prevention, Security Management
Skills you'll gain: Cloud Security, Microsoft Azure, Threat Management, Security Controls, Security Information and Event Management (SIEM), Key Management, Role-Based Access Control (RBAC), Cloud Services, Network Security, System Monitoring, Virtual Environment, Query Languages
Infosec
Skills you'll gain: Network Analysis, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Network Monitoring, Cyber Threat Hunting, Anomaly Detection
Whizlabs
Skills you'll gain: Infrastructure Security, Vulnerability Scanning, Network Security, Amazon Web Services, Firewall, Vulnerability Assessments, Network Infrastructure, Virtual Private Networks (VPN), Security Controls, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Network Routing, Load Balancing
Skills you'll gain: Security Information and Event Management (SIEM), Microsoft Azure, System Configuration, Threat Detection, Event Monitoring, Role-Based Access Control (RBAC), Incident Management, System Requirements, Automation, Query Languages
Skills you'll gain: Computer Security Incident Management, Incident Management, Incident Response, Security Management, Threat Management, Event Monitoring, Security Information and Event Management (SIEM), Enterprise Security, Cyber Operations, Information Technology Operations, Automation
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Security Controls, Security Testing, Virtual Machines, Application Security, Technical Documentation, Data Security, Web Servers, Linux
Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cryptography, Security Testing, Cybersecurity, Vulnerability Assessments, Encryption, Technical Writing, Cyber Threat Intelligence, Cyber Attacks
Johns Hopkins University
Skills you'll gain: Generative AI, Feature Engineering, Cybersecurity, Threat Modeling, Security Engineering, Deep Learning, Anomaly Detection, Artificial Intelligence, Artificial Neural Networks, Data Processing, Applied Machine Learning, Reinforcement Learning, Data Modeling, Machine Learning, Performance Tuning
Vanderbilt University
Skills you'll gain: Crisis Management, Incident Response, ChatGPT, Computer Security Incident Management, Cross-Functional Collaboration, Threat Modeling, Cybersecurity, Scenario Testing, Hardening, Complex Problem Solving, Discussion Facilitation, Artificial Intelligence, Decision Making, Performance Analysis, Developing Training Materials
In summary, here are 10 of our most popular attack+surface courses
- Deploy AI Apps with Cloudflare:Â Scrimba
- Introduction to Prompt Injection Vulnerabilities:Â Coursera Instructor Network
- Cloud Security on AWS:Â Edureka
- Microsoft Defender Cloud Compliance - Secure Azure Services:Â Microsoft
- Defensive Python:Â Infosec
- AWS: Infrastructure Security:Â Whizlabs
- Configure SIEM Security Operation using Microsoft Sentinel:Â Microsoft
- SOAR for Enterprise Security:Â Codio
- Offensive Hacking Unfolded - Become a Pro Pentester:Â Packt
- Cybersecurity Fundamentals:Â Johns Hopkins University