Filter by
The language used throughout the course, in both instruction and assessments.
Results for "os+vulnerability+exploitation+and+mitigation"
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Incident Management, Leadership and Management
Skills you'll gain: Audit, Computer Security Incident Management, Leadership and Management, Risk Management
Skills you'll gain: Cloud Computing, Operating Systems, System Security
Skills you'll gain: Linux, Operating Systems
Skills you'll gain: Security Engineering, Application Development, Software Engineering, Software Security, DevOps
Skills you'll gain: Cloud Computing, Computer Architecture, Operating Systems
Skills you'll gain: Network Security, Networking Hardware, Cloud Computing, Cryptography, Cyberattacks, Databases, Leadership and Management, Operating Systems, Risk Management, SQL, System Security
Skills you'll gain: Cryptography, Leadership and Management, Linux
Cisco Learning and Certifications
Skills you'll gain: Computer Security Incident Management, Network Security
Skills you'll gain: Network Security, Security Engineering, System Security, Computer Networking, Computer Security Incident Management, Software Security, Computer Security Models, Mobile Security, Cyberattacks, Security Software, Internet Of Things, Network Architecture, Cloud Computing, Kubernetes, Regulations and Compliance
Skills you'll gain: Operating Systems
Akamai Technologies, Inc.
Skills you'll gain: Leadership and Management, Operating Systems
In summary, here are 10 of our most popular os+vulnerability+exploitation+and+mitigation courses
- Introduction to Cybersecurity Fundamentals:Â Coursera Instructor Network
- Play It Safe: Manage Security Risks:Â Google
- Operating Systems: Overview, Administration, and Security:Â IBM
- Operating Systems and You: Becoming a Power User:Â Google
- Application Security for Developers and DevOps Professionals:Â IBM
- Introduction to Computers and Operating Systems and Security:Â Microsoft
- IT Fundamentals for Cybersecurity:Â IBM
- Assets, Threats, and Vulnerabilities:Â Google
- Cybersecurity Operations Fundamentals:Â Cisco Learning and Certifications
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council