Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "system exploitation"
Skills you'll gain: Computer Networking, Network Troubleshooting, Network Administration, TCP/IP, Network Protocols, Network Routing, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks, Network Model, Data Integrity
Skills you'll gain: Threat Management, Cybersecurity, Risk Management Framework, Risk Management, Business Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Open Web Application Security Project (OWASP), Auditing
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
- Status: Free
Università Bocconi
Skills you'll gain: Private Equity, Business Valuation, Entrepreneurial Finance, Capital Markets, Mergers & Acquisitions, Investments, Financial Management, Legal Risk, Tax Laws, Entrepreneurship, Due Diligence, Negotiation, Cash Flows
DeepLearning.AI
Skills you'll gain: Generative AI, Large Language Modeling, OpenAI, ChatGPT, Prompt Engineering, PyTorch (Machine Learning Library), Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Tensorflow, Applied Machine Learning, Scalability, Natural Language Processing, Application Deployment, Reinforcement Learning, Performance Tuning, Performance Metric
Rutgers the State University of New Jersey
Skills you'll gain: Strategic Sourcing, Lean Six Sigma, Lean Manufacturing, Demand Planning, Procurement, Supplier Relationship Management, Forecasting, Process Improvement, Supplier Management, Operations Management, Customer Demand Planning, Purchasing, Production Process, Supply Management, Operational Efficiency, Warehouse Management, Supply Chain Planning, Inventory and Warehousing, Inventory Management System, Transportation, Supply Chain, and Logistics
- Status: New
Skills you'll gain: Data Storytelling, Requirements Elicitation, Risk Mitigation, Business Analysis, Business Process Modeling, Risk Analysis, Process Mapping, Process Optimization, Requirements Management, Risk Management, Business Requirements, Stakeholder Management, Work Breakdown Structure, Scope Management, Process Analysis, Stakeholder Engagement, Data Visualization Software, Excel Formulas, Microsoft Excel, Analysis
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Wrangling, Data Visualization, Plot (Graphics), Statistical Programming, Ggplot2, Big Data, Git (Version Control System), Data Integration, Knitr, Data Analysis, Data Sharing, Statistical Reporting
University of California, Irvine
Skills you'll gain: Test Planning, Embedded Systems, Linux, Internet Of Things, Embedded Software, Functional Requirement, Debugging, General Networking, Hardware Design, Systems Design, Operating Systems, Requirements Analysis, Electronic Hardware, System Design and Implementation, C (Programming Language), Basic Electrical Systems, Application Programming Interface (API), TCP/IP, Wireless Networks, Integrated Development Environments
Skills you'll gain: Bash (Scripting Language), Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Infosec
Skills you'll gain: Penetration Testing, Linux Commands, Command-Line Interface, Cyber Security Assessment, Linux, Cybersecurity, Operating Systems, Vulnerability Assessments, Windows PowerShell, Microsoft Windows, Computer Systems, Mac OS
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Cloud Services, Debugging, Puppet (Configuration Management Tool), Infrastructure as Code (IaC), Bash (Scripting Language), Configuration Management, CI/CD, Cloud Computing, Technical Communication, Docker (Software), Unit Testing, Scripting, Network Troubleshooting, Web Services, Python Programming, Restful API, Programming Principles
In summary, here are 10 of our most popular system exploitation courses
- The Bits and Bytes of Computer Networking: Google
- Play It Safe: Manage Security Risks: Google
- Sound the Alarm: Detection and Response: Google
- Private Equity and Venture Capital: Università Bocconi
- Generative AI with Large Language Models: DeepLearning.AI
- Supply Chain Management: Rutgers the State University of New Jersey
- IBM Business Analyst: IBM
- Data Science: Foundations using R: Johns Hopkins University
- An Introduction to Programming the Internet of Things (IOT): University of California, Irvine
- Tools of the Trade: Linux and SQL: Google