Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber exploitation"
Skills you'll gain: General Networking, Network Architecture, Threat Management, Cybersecurity, Networking Hardware, Information Technology, Network Security, Network Routers, Security Controls, Cyber Attacks, Network Switches, Firewall, Security Strategy
Microsoft
Skills you'll gain: Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Microsoft Azure, Security Controls, Security Strategy, Incident Response, Threat Detection, Generative AI, Artificial Intelligence, Automation, Natural Language Processing
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Mobile Security, Application Deployment, Endpoint Security, Threat Management, Apple iOS, System Configuration, Threat Detection, Cyber Security Policies, Application Security
- Status: New
Skills you'll gain: Cybersecurity, Network Security, Cyber Attacks, Cryptography, Threat Modeling, Information Systems Security, Identity and Access Management, Application Security, Firewall, Encryption, Threat Detection, Cyber Threat Intelligence, Security Management, Public Key Infrastructure, Infrastructure Security, Security Controls, Authentications, Risk Management Framework, Authorization (Computing), Network Architecture
Skills you'll gain: Risk Management, Enterprise Risk Management (ERM), Risk Analysis, Business Risk Management, Governance Risk Management and Compliance, Blockchain, Cyber Risk, Security Management, Information Technology Architecture, Governance, Application Security, Project Documentation, Technical Documentation, Regulatory Compliance, Solution Architecture, Regulatory Requirements, Network Security, Financial Regulation, Document Management, Data Governance
- Status: New
Kennesaw State University
Skills you'll gain: Cyber Security Policies, Cybersecurity, Incident Response, Cyber Attacks, Computer Security Awareness Training, Security Awareness, Cyber Risk, Remote Access Systems, Telecommuting, Malware Protection, Human Factors (Security), Email Security
LearnQuest
Skills you'll gain: Threat Modeling, IT Security Architecture, Threat Detection, Internet Of Things, Network Security, Information Systems Security, Security Controls, Cybersecurity, Vulnerability Assessments, Risk Management Framework, Authentications, Cyber Risk, Encryption, Cloud Computing
- Status: Free
Coursera Project Network
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment, Network Security, Virtual Environment
Skills you'll gain: Security Testing, Vulnerability Assessments, Cyber Security Assessment, Vulnerability Scanning, Penetration Testing, Threat Modeling, Security Controls, Test Planning, Simulations
- Status: New
Skills you'll gain: Cyber Threat Intelligence, Incident Response, Vulnerability Assessments, Threat Modeling, Cybersecurity, Network Security, Penetration Testing, Security Controls, Threat Detection, Vulnerability Management, Intrusion Detection and Prevention, Application Security, Malware Protection, Encryption
- Status: New
Skills you'll gain: Endpoint Security, Network Security, Public Key Infrastructure, Hardening, Network Administration, Cybersecurity, Virtual Private Networks (VPN), Firewall, Cyber Attacks, Multi-Factor Authentication, Patch Management, Cloud Security, Cryptography, Threat Modeling, Infrastructure Security, Security Controls, Intrusion Detection and Prevention, Network Monitoring, Cloud Computing, Information Systems Security
- Status: Free
Starweaver
Skills you'll gain: Threat Management, Vulnerability Management, Cybersecurity, Threat Detection, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Vulnerability Scanning, Cyber Attacks, Patch Management
In summary, here are 10 of our most popular cyber exploitation courses
- Security Administration with Cisco Defense Orchestrator:Â LearnQuest
- Microsoft Copilot for Security:Â Microsoft
- Check Point Jump Start: Harmony Mobile:Â Check Point Software Technologies Ltd.
- Security Foundations, Threats, and Network Protection:Â Packt
- Blockchain Architecture - Intermediate Concepts :Â LearnQuest
- An Employee's Guide to Cybersecurity:Â Kennesaw State University
- Foundations of Secure IoT Architecture:Â LearnQuest
- للمبتدئين Metasploit: أساسيات الاستغلال : Coursera Project Network
- Security Assessment and Testing:Â Packt
- TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003):Â Packt