Filter by
The language used throughout the course, in both instruction and assessments.
Results for "post-exploitation+techniques"
Skills you'll gain: File Management, Peer Review, Storytelling, Media Production, Multimedia, Automation, Post-Production, Content Creation, Software Installation, Creativity, Writing, Computer Programming
University of Minnesota
Skills you'll gain: User Story, Agile Software Development, Agile Methodology, Agile Project Management, Scrum (Software Development), Sprint Planning, Software Development Methodologies, Sprint Retrospectives, Backlogs, Continuous Integration, Test Driven Development (TDD), Release Management
Duke University
Skills you'll gain: Debugging, Maintainability, Programming Principles, Algorithms, Software Testing, Program Development, C (Programming Language), Pseudocode, Computational Thinking, Software Engineering, Simulations, System Programming, Data Structures, Software Development, Computer Programming, Command-Line Interface, Development Environment, Development Testing, User Interface (UI), Interactive Design
University of Michigan
Skills you'll gain: Cascading Style Sheets (CSS), Web Content Accessibility Guidelines, HTML and CSS, Web Design, Responsive Web Design, User Interface (UI), Usability, Front-End Web Development, Web Development Tools, Typography, Debugging
University of California San Diego
Skills you'll gain: Event-Driven Programming, Interactive Data Visualization, Java, Java Programming, Object Oriented Programming (OOP), User Interface (UI), Computer Programming, Algorithms, Graphical Tools, Software Engineering, Data Structures, Programming Principles, Software Documentation, Development Environment, Debugging
Skills you'll gain: Data Manipulation, SAS (Software), Data Access, Data Import/Export, Microsoft Excel, Data Analysis, Data Transformation, Exploratory Data Analysis, Data Validation, Data Cleansing, Descriptive Statistics, Statistical Programming, Data Processing, Data Integration, SQL, Data Presentation, Debugging
Skills you'll gain: Peer Review, Active Listening, Media Production, Storytelling, Post-Production, Editing, Constructive Feedback, Emotional Intelligence, Creative Thinking, Multimedia, Writing, Personal Development, Timelines, Performance Tuning, Self-Awareness, Content Creation, Creativity, Automation, Adaptability
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Cybersecurity, Dependency Analysis, Docker (Software), Git (Version Control System)
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Public Key Infrastructure, Threat Modeling, Cryptography, Security Testing, Cyber Threat Intelligence, Mobile Security, Cybersecurity, Application Security, Vulnerability Assessments, Network Security, Threat Detection, Encryption, Operating Systems, Web Applications, Malware Protection, Technical Writing, Information Systems Security, Wireless Networks
Arizona State University
Skills you'll gain: Literacy, Grammar
Skills you'll gain: Social Media Management, Social Media, Content Creation, Instagram, Social Media Marketing, Social Media Strategy, Facebook, Branding, Content Strategy, Brand Management, Content Management, Customer Engagement
University of California San Diego
Skills you'll gain: Algorithms, Debugging, Development Testing, Software Testing, Computational Thinking, Computer Programming, Data Structures, Theoretical Computer Science
In summary, here are 10 of our most popular post-exploitation+techniques courses
- Songwriting: Writing, Arranging, and Producing Music: Berklee
- Agile Software Development: University of Minnesota
- Introductory C Programming: Duke University
- Introduction to CSS3: University of Michigan
- Object Oriented Programming in Java: University of California San Diego
- SAS Programmer: SAS
- Writing and Producing Music in Your Home Studio: Berklee
- Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
- Introduction to Ethical Hacking: Johns Hopkins University
- Teach English Now! Second Language Reading, Writing, and Grammar : Arizona State University