Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber exploitation"
Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Information Systems Security Assessment Framework (ISSAF), Security Strategy, Security Awareness, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis, Personally Identifiable Information
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Data Integrity
University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Information Assurance, Security Controls, Incident Response
- Status: Free
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), Automation, Event Monitoring, Cyber Threat Hunting, Continuous Monitoring, Security Management, Anomaly Detection, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML)
Skills you'll gain: Vulnerability Management, Azure Active Directory, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Generative AI, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Single Sign-On (SSO), Microsoft Azure, Security Management, Cyber Security Policies, Identity and Access Management, Data Management, Records Management, Authentications, System Monitoring, Data Ethics, ChatGPT
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Peripheral Devices, Cybersecurity, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Cloud Platforms, System Support, Encryption, Data Storage, Cyber Attacks, Desktop Support, Software Development Life Cycle, Networking Hardware, Application Development, Information Technology, Cloud Computing, Databases
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Threat Detection, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Encryption, Cyber Threat Intelligence, Incident Management, Information Systems Security, Threat Management
University of Virginia
Skills you'll gain: Design Thinking, Digital Transformation, Creative Problem-Solving, New Product Development, Ideation, Business Transformation, Product Management, Technology Strategies, Agile Product Development, Innovation, Creativity, Product Lifecycle Management, Strategic Thinking, Product Improvement, Market Opportunities, Information Technology, Competitive Analysis, Business Analysis, Business Strategy, Cyber Risk
Skills you'll gain: Stakeholder Communications, Incident Response, Stakeholder Engagement, Computer Security Incident Management, Data Ethics, Cybersecurity, Security Awareness, Incident Management, Data Security, Communication, Asset Protection, Ethical Standards And Conduct, Business Ethics, Interviewing Skills, Professional Networking
Skills you'll gain: Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
In summary, here are 10 of our most popular cyber exploitation courses
- Foundations of Cybersecurity:Â Google
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Introduction to Cyber Attacks:Â New York University
- Cyber Security Fundamentals:Â University of London
- Automated Cyber Security Incident Response:Â EDUCBA
- Microsoft Azure Cybersecurity Tools and Solutions:Â Microsoft
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Information Technology (IT) and Cloud Fundamentals:Â IBM
- Cybersecurity Operations Fundamentals:Â Cisco Learning and Certifications
- Leading the Modern Day Business:Â University of Virginia