Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "penetration testing & exploit mitigation"
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Penetration Testing, Application Security, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
Skills you'll gain: ChatGPT, Generative AI, OpenAI, CI/CD, Software Development, Software Development Life Cycle, DevSecOps, Data Ethics, Natural Language Processing, Prototyping, Software Architecture, Artificial Intelligence, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Software Testing, Software Development Tools, Augmented and Virtual Reality (AR/VR), Debugging, Image Analysis, Technical Communication
Johns Hopkins University
Skills you'll gain: Shiny (R Package), Rmarkdown, Exploratory Data Analysis, Regression Analysis, Leaflet (Software), Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Statistical Inference, Predictive Modeling, Statistical Hypothesis Testing, Data Visualization, Plotly, Machine Learning Algorithms, Interactive Data Visualization, Probability & Statistics, Knitr
Skills you'll gain: OSI Models, Vulnerability Scanning, Penetration Testing, TCP/IP, General Networking, Network Security, Network Protocols, Network Monitoring, Cyber Security Assessment, Network Administration, Vulnerability Assessments, Computer Networking, Network Analysis, Firewall, Scripting, Performance Tuning, System Configuration, Software Installation
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
University of California San Diego
Skills you'll gain: Design Research, Interaction Design, User Experience Design, Statistical Analysis, Ideation, User Research, Graphic and Visual Design, User Interface (UI) Design, Experimentation, Prototyping, A/B Testing, Usability Testing, Human Centered Design, User Centered Design, Mockups, Design, Human Computer Interaction, Human Factors, Telecommuting, Technology Strategies
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Assessments, Infrastructure Security, Distributed Denial-Of-Service (DDoS) Attacks, Application Security, Cloud Security, Network Security, Internet Of Things, Wireless Networks, Application Programming Interface (API), Business Logic
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Cybersecurity, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, Threat Management, System Testing, Threat Detection, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface
Coursera Project Network
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Information Systems Security, Data Ethics, Command-Line Interface, Technical Documentation
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Cybersecurity, Dependency Analysis, Docker (Software), Git (Version Control System)
In summary, here are 10 of our most popular penetration testing & exploit mitigation courses
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Secure Coding Practices:Â University of California, Davis
- Generative AI for Software Developers:Â IBM
- Data Science:Â Johns Hopkins University
- Nmap for Penetration Testing: From Beginner to Advanced:Â Packt
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- Interaction Design:Â University of California San Diego
- Advanced Penetration Techniques:Â Packt
- Hacking and Patching:Â University of Colorado System
- Cybersecurity Testing and Prevention:Â Microsoft