Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber exploitation"
- Status: New
Skills you'll gain: IT Security Architecture, Network Security, Infrastructure Security, Software-Defined Networking, Application Security, Zero Trust Network Access, Network Architecture, Threat Modeling, Cyber Security Assessment, Cybersecurity, Secure Coding, Cloud Security, DevSecOps, Scenario Testing, Cryptography, Enterprise Security, Vulnerability Assessments, Identity and Access Management
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Assessment, Cybersecurity, Threat Detection, Incident Response, Cyber Operations, Generative AI, Data Ethics, Security Testing, Vulnerability Assessments
- Status: New
Skills you'll gain: Cyber Operations, Cyber Threat Intelligence, Cybersecurity, Intrusion Detection and Prevention, Firewall, Security Controls, Network Security, Incident Response, Threat Modeling, Security Information and Event Management (SIEM), Threat Detection, Continuous Monitoring, Network Analysis, Cyber Risk, Vulnerability Management
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Cyber Attacks, Threat Modeling, Risk Analysis, Application Security, Vulnerability Assessments, Network Security, Threat Detection, Data Security, Artificial Intelligence, Risk Mitigation, Generative AI, Natural Language Processing
Board Infinity
Skills you'll gain: Manufacturing Operations, Manufacturing Processes, Cloud Computing, Augmented and Virtual Reality (AR/VR), Production Process, Internet Of Things, Emerging Technologies, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Blockchain, Augmented Reality, Artificial Intelligence, Virtual Reality, Big Data, Machine Learning
- Status: Free
Coursera Project Network
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Verification And Validation, Cyber Security Assessment, Linux Commands, Command-Line Interface, Virtual Machines
- Status: New
Skills you'll gain: Vulnerability Scanning, Threat Modeling, Vulnerability Management, Vulnerability Assessments, Secure Coding, Security Testing, Threat Management, Cyber Governance, Cyber Security Policies, Cyber Security Assessment, Cyber Attacks, Application Security, Open Web Application Security Project (OWASP), Threat Detection, Cybersecurity, Risk Management Framework, Security Management, Security Controls, Code Review, Incident Response
Skills you'll gain: Embedded Systems, Machine Controls, Electronic Systems, Automation, Power Electronics, Engineering, Electronic Components, Basic Electrical Systems, Mechanical Design, Mechanical Engineering, Hydraulics, Thermal Management, Matlab, Real Time Data
- Status: New
Skills you'll gain: Disaster Recovery, Risk Management, Compliance Management, Governance Risk Management and Compliance, Regulatory Requirements, Risk Analysis, Cloud Security, Business Continuity, Cyber Risk, Security Management, Vendor Management, Data Security, Business Analysis, Personally Identifiable Information
Skills you'll gain: Embedded Systems, Internet Of Things, Vibrations, Civil Engineering, Electronic Systems, Structural Engineering, Maintenance, Repair, and Facility Services, Wireless Networks, Automation, Environmental Monitoring, System Monitoring, Continuous Monitoring, Computer Programming Tools, Electronic Components, Peripheral Devices
- Status: New
Packt
Skills you'll gain: Cybersecurity, Cyber Attacks, Unix, Virtualization, Computer Security Awareness Training, Computer Security, Linux, Information Systems Security, Linux Administration, Cyber Security Assessment, Microsoft Windows, Network Security, Virtual Machines, Data Ethics, System Configuration, Linux Commands, Data Security, Ethical Standards And Conduct, Security Awareness, Security Controls
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Vulnerability Management, Cyber Security Assessment, Hardening, Cybersecurity, Linux, Security Testing, Security Controls, Linux Commands, Authorization (Computing), Command-Line Interface, Microsoft Windows, Cryptography, Authentications, Unix Commands, Scripting, Virtual Machines, File Management
In summary, here are 10 of our most popular cyber exploitation courses
- Advanced Security Architecture:Â Packt
- GenAI for Cybersecurity Analysts:Â Coursera Instructor Network
- Cisco CyberOps Associate (200-201):Â Packt
- Introduction to Prompt Injection Vulnerabilities:Â Coursera Instructor Network
- Key Industry 4.0 Technologies in Manufacturing - 2:Â Board Infinity
- Metasploit para Principiantes: Básicos de explotación: Coursera Project Network
- Vulnerability Types and Concepts:Â Packt
- CPS Design for Mechatronics, Healthcare, EV & Robotics:Â L&T EduTech
- Governance, Risk, and Compliance:Â Packt
- CPS Design with ARM Core using MicroPython for Industries:Â L&T EduTech