Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "exploitation techniques"
Coursera Project Network
Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation
- Status: NewStatus: Preview
Board Infinity
Skills you'll gain: Hibernate (Java), Multi-Tenant Cloud Environments, Object-Relational Mapping, Spring Boot, Performance Tuning, Java, Authentications
- Status: Free Trial
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, MITRE ATT&CK Framework, Exploitation techniques, Threat Detection, Infrastructure Security, Payment Card Industry (PCI) Data Security Standards, NIST 800-53, Network Analysis, General Data Protection Regulation (GDPR), Information Privacy
Skills you'll gain: Selling Techniques, Sales Strategy, Overcoming Objections, Closing (Sales), Sales Process, Customer Engagement, Sales Presentation, Solution Selling, Data-Driven Decision-Making, Customer Relationship Building, Value Propositions, Competitive Analysis, Price Negotiation, Rapport Building, Active Listening
- Status: Free Trial
DeepLearning.AI
Skills you'll gain: Generative AI, Tensorflow, Computer Vision, Image Analysis, Generative Model Architectures, Deep Learning, Keras (Neural Network Library), Artificial Neural Networks, Distributed Computing, Unsupervised Learning, Network Model, Software Visualization, Performance Tuning, Scientific Visualization, NumPy, Object Oriented Programming (OOP), Network Architecture
- Status: Preview
Starweaver
Skills you'll gain: Threat Modeling, Cyber Threat Intelligence, Vulnerability Management, Cybersecurity, Threat Detection, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Cyber Attacks, Cyber Operations, Patch Management, Continuous Monitoring, Configuration Management
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Computer Architecture
- Status: Free Trial
Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, General Networking, Network Security, Cybersecurity, Data Ethics, Vulnerability Assessments, Wireless Networks, System Configuration, Software Installation, Virtual Machines
- Status: New
Macquarie University
Skills you'll gain: Mobile Security, Investigation, Mobile Development, Apple iOS, Criminal Investigation and Forensics, Android (Operating System), Application Security, Legal Proceedings, Cybersecurity, File Systems, Malware Protection, Computer Security, Secure Coding, Computer Security Incident Management, Cloud Security, Security Strategy, Analysis, Encryption, Debugging, Disaster Recovery
University of Illinois Urbana-Champaign
Skills you'll gain: New Product Development, Product Development, Design Thinking, Market Research, Quantitative Research, Product Management, Customer Insights, Consumer Behaviour, Market Analysis, Target Market, Forecasting, Innovation, Needs Assessment, Analysis, Data Collection, Technology Solutions
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Applied Machine Learning, Network Security, Machine Learning Algorithms, Machine Learning, Machine Learning Software, Unsupervised Learning, Supervised Learning, Artificial Neural Networks
- Status: Free Trial
Skills you'll gain: SAS (Software), Perl (Programming Language), Data Processing, Statistical Programming, Stored Procedure, Data Manipulation, Data Transformation, Data Analysis
Searches related to exploitation techniques
In summary, here are 10 of our most popular exploitation techniques courses
- Metasploit for Beginners: Ethical Penetration Testing:Â Coursera Project Network
- Advanced Hibernate Techniques:Â Board Infinity
- Foundations and Reconnaissance Techniques:Â Packt
- Sales Strategies and Techniques:Â Packt
- TensorFlow: Advanced Techniques:Â DeepLearning.AI
- Deception As a Defense:Â Starweaver
- Advanced Cybersecurity Topics:Â Johns Hopkins University
- Ethical Hacking Foundations:Â Packt
- Cyber Security: Mobile Security:Â Macquarie University
- Customer Insights: Quantitative Techniques:Â University of Illinois Urbana-Champaign