Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "penetration testing & exploit mitigation"
University of Virginia
Skills you'll gain: Usability Testing, Agile Product Development, New Product Development, Continuous Delivery, User Story, Product Management, Agile Methodology, Product Testing, Agile Project Management, Team Management, Design Thinking, Team Leadership, DevOps, Innovation, Analytics, Product Improvement, Business Analytics, Ideation, Product Lifecycle Management, Sprint Retrospectives
Skills you'll gain: CI/CD, Open Web Application Security Project (OWASP), Istio, Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Jenkins, Bash (Scripting Language), Cloud Services, DevOps, Git (Version Control System), Jupyter, Grafana
University of California, Santa Cruz
Skills you'll gain: C++ (Programming Language), Go (Programming Language), Debugging, C (Programming Language), Data Structures, Object Oriented Programming (OOP), Object Oriented Design, Software Design Patterns, Programming Principles, Computer Programming, Unit Testing, Algorithms, Command-Line Interface, Program Development, Software Design, Graph Theory, Computer Science, Software Testing, File Systems, Computational Thinking
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security), Personally Identifiable Information
University of Michigan
Skills you'll gain: UI/UX Research, Qualitative Research, User Experience Design, User Experience, Usability Testing, User Research, Prototyping, Wireframing, User Centered Design, Survey Creation, Sampling (Statistics), Design Research, Interaction Design, A/B Testing, Usability, Test Case, Design Thinking, Design, Human Computer Interaction, Research Methodologies
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Application Security, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls
Skills you'll gain: Secure Coding, Penetration Testing, Application Security, Payment Systems, Continuous Monitoring, Blockchain, Incident Response, Code Review, Vulnerability Assessments, Data Security, Development Testing, Authorization (Computing), Data Validation
Skills you'll gain: Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Security Awareness, Cyber Threat Intelligence, Malware Protection, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training
University of California, Davis
Skills you'll gain: Data Governance, Presentations, Feature Engineering, A/B Testing, Data Cleansing, SQL, Apache Spark, Distributed Computing, Descriptive Statistics, Data Lakes, Data Storytelling, Peer Review, Exploratory Data Analysis, Data Quality, Data Pipelines, Databricks, JSON, Statistical Analysis, Query Languages, Data Manipulation
Skills you'll gain: MySQL, Database Design, Version Control, Database Management Systems, MySQL Workbench, Extract, Transform, Load, Stored Procedure, Data Modeling, Data Structures, SQL, Database Theory, Unix Commands, Relational Databases, Databases, Git (Version Control System), Object Oriented Programming (OOP), Database Management, Database Development, Unit Testing, Algorithms
University of Virginia
Skills you'll gain: Usability Testing, Agile Product Development, Continuous Delivery, User Story, Agile Methodology, Product Testing, Agile Project Management, Team Management, Design Thinking, Team Leadership, DevOps, Analytics, Business Analytics, Sprint Retrospectives, Product Management, Product Design, Customer Insights, A/B Testing, Product Development, User Research
University of California San Diego
Skills you'll gain: Design Research, Interaction Design, User Experience Design, Statistical Analysis, Ideation, User Research, Graphic and Visual Design, User Interface (UI) Design, Experimentation, Prototyping, A/B Testing, Usability Testing, Human Centered Design, User Centered Design, Mockups, Design, Human Computer Interaction, Human Factors, Telecommuting, Technology Strategies
In summary, here are 10 of our most popular penetration testing & exploit mitigation courses
- Digital Product Management:Â University of Virginia
- IBM DevOps and Software Engineering:Â IBM
- C, Go, and C++: A Comprehensive Introduction to Programming:Â University of California, Santa Cruz
- Cyber Threats and Attack Vectors:Â University of Colorado System
- User Experience Research and Design:Â University of Michigan
- Fundamentals of Computer Network Security:Â University of Colorado System
- Security and Auditing in Ethereum:Â EDUCBA
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- Learn SQL Basics for Data Science:Â University of California, Davis
- Meta Database Engineer:Â Meta