Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "exploit development"
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Web Applications, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cyber Security Assessment, Application Security, Web Servers, Content Management Systems, Application Programming Interface (API), Databases
- Status: Free Trial
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, C (Programming Language)
Coursera Project Network
Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Test Tools, Human Factors (Security)
Skills you'll gain: Penetration Testing, Exploitation techniques, Scenario Testing, Cybersecurity, Vulnerability Assessments, Linux, Operating System Administration, Command-Line Interface, Linux Commands, Cryptography, File Management, Microsoft Windows, Unix Commands, Scripting, Virtual Machines
- Status: Free Trial
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, MITRE ATT&CK Framework, Exploitation techniques, Threat Detection, Infrastructure Security, Payment Card Industry (PCI) Data Security Standards, NIST 800-53, Network Analysis, General Data Protection Regulation (GDPR), Information Privacy
Skills you'll gain: Cloud-Native Computing, Application Deployment, Cloud Applications, Infrastructure as Code (IaC), Google Cloud Platform, Application Performance Management, Docker (Software), Containerization, Performance Tuning, Continuous Deployment, Debugging, Node.JS
Searches related to exploit development
In summary, here are 7 of our most popular exploit development courses
- Hands-On Web App Pentesting: Packt
- Hacking and Patching: University of Colorado System
- Metasploit for Beginners: Ethical Penetration Testing: Coursera Project Network
- Introduction to Penetration Testing and Ethical Hacking: Johns Hopkins University
- The Complete Pentesting and Privilege Escalation Course: Packt
- Foundations and Reconnaissance Techniques: Packt
- App Deployment, Debugging, and Performance - Español: Google Cloud