Filter by
The language used throughout the course, in both instruction and assessments.
Results for "os+vulnerability+exploitation+and+mitigation"
Skills you'll gain: Cloud Computing, Operating Systems, System Security
Skills you'll gain: Security Engineering, Application Development, Software Engineering, Software Security, DevOps
Board Infinity
Skills you'll gain: Linux, Databases, SQL
Skills you'll gain: Audit, Computer Security Incident Management, Leadership and Management, Risk Management
- Status: Free
Coursera Project Network
Skills you'll gain: Network Security
Skills you'll gain: Security Strategy, Computer Security Incident Management, Python Programming, Computer Programming, Cryptography
Skills you'll gain: Cryptography, Leadership and Management, Linux
University of Maryland, College Park
Skills you'll gain: Human Computer Interaction, Software Security, System Security, Systems Design, User Experience, Cyberattacks, Design and Product, Security Engineering, User Research, Interactive Design
Skills you'll gain: Cloud Computing, Computer Security Models, Cyberattacks, Google Cloud Platform, Network Security, Security Engineering, Security Software, Security Strategy, Software Security, System Security
Skills you'll gain: Cloud Computing, Computer Architecture, Operating Systems
University of Colorado System
Skills you'll gain: Operating Systems, System Software, System Programming, Leadership and Management
In summary, here are 10 of our most popular os+vulnerability+exploitation+and+mitigation courses
- Operating Systems: Overview, Administration, and Security:Â IBM
- Application Security for Developers and DevOps Professionals:Â IBM
- Kali Linux:Â Board Infinity
- Tools of the Trade: Linux and SQL:Â Google
- Play It Safe: Manage Security Risks:Â Google
- Vulnerability Scanning with Nmap: Network Scanning:Â Coursera Project Network
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Assets, Threats, and Vulnerabilities:Â Google
- Usable Security:Â University of Maryland, College Park
- Mitigating Security Vulnerabilities on Google Cloud:Â Google Cloud