Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Systems Development Life Cycle, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Security Controls, Change Management, System Implementation, System Monitoring, Risk Analysis, Risk Mitigation, Software Development
Skills you'll gain: ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Artificial Intelligence, Natural Language Processing, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Vulnerability Management, Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Technical Communication
Skills you'll gain: CI/CD, Istio, Open Web Application Security Project (OWASP), Continuous Integration, Agile Software Development, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Jenkins, Kubernetes, Code Coverage, OpenShift, Cloud Applications, Containerization, Agile Methodology, Behavior-Driven Development, DevOps, Secure Coding, Grafana, System Monitoring
Skills you'll gain: Cloud Computing Architecture, Peripheral Devices, Technical Support, Technical Support and Services, Cloud Services, Cybersecurity, Computing Platforms, Hardware Troubleshooting, IT Service Management, Cloud Security, Cloud Infrastructure, Network Protocols, Encryption, Software Development Life Cycle, Professional Networking, Cloud Storage, Information Technology, Cloud Computing, Interviewing Skills, Computer Hardware
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Infrastructure as Code (IaC), Amazon CloudWatch, AWS CloudFormation, Software Development Life Cycle, CI/CD, Amazon Web Services, Professional Networking, IT Automation, Cloud Computing, Amazon S3, Extract, Transform, Load, DevOps, Data-Driven Decision-Making, Software Architecture, Cloud Computing Architecture, Amazon DynamoDB, Cloud Infrastructure, Web Applications, Leadership Development
- Status: AI skills
Google Cloud
Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Generative AI, DevSecOps, Cloud Computing, Data Security, Google Cloud Platform, Cybersecurity
Skills you'll gain: Debugging, Python Programming, Cybersecurity, Scripting, Programming Principles, Data Import/Export, Algorithms, Automation, Computer Programming, File Management
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Application Specific Integrated Circuits, Cryptography, Encryption, Technical Design, Emerging Technologies, System Design and Implementation
Skills you'll gain: Identity and Access Management, Endpoint Security, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cyber Security Strategy, Secure Coding, Firewall, Application Security, Authentications, Security Controls, Authorization (Computing), Security Information and Event Management (SIEM), Data Governance, Incident Response
Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Amazon DynamoDB, Amazon Web Services, Cloud Computing, Amazon S3, Scalability, Cloud Infrastructure, Amazon Elastic Compute Cloud, Cloud Security, Serverless Computing, Cloud Storage, Databases, Virtual Private Networks (VPN), Load Balancing, General Networking, Containerization
Skills you'll gain: Cloud Infrastructure, Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Infrastructure As A Service (IaaS), Network Monitoring, Cloud Applications, Cloud Computing Architecture, Network Architecture, Role-Based Access Control (RBAC), Network Security, Cloud Computing, Network Routing, Cloud Security, Virtual Private Networks (VPN)
In summary, here are 10 of our most popular breach (security exploit) courses
- Information Systems Auditing, Controls and Assurance:Â The Hong Kong University of Science and Technology
- IBM Generative AI for Cybersecurity Professionals:Â IBM
- IBM Applied DevOps Engineering:Â IBM
- IBM IT Support:Â IBM
- Sound the Alarm: Detection and Response:Â Google
- AWS Cloud Technology Consultant:Â Amazon Web Services
- Google Cloud Cybersecurity:Â Google Cloud
- Automate Cybersecurity Tasks with Python:Â Google
- Hardware Security:Â University of Maryland, College Park
- Cybersecurity Architecture:Â IBM