Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "exploitation techniques"
- Status: Free Trial
Skills you'll gain: Unsupervised Learning, Generative AI, Large Language Modeling, Supervised Learning, Deep Learning, Applied Machine Learning, Artificial Intelligence and Machine Learning (AI/ML), Reinforcement Learning, Statistical Machine Learning, Predictive Modeling, Machine Learning Algorithms, Artificial Neural Networks, Feature Engineering, Unstructured Data, Dimensionality Reduction, Performance Metric
Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Vulnerability Scanning, Application Security, Exploitation techniques, Vulnerability Assessments, Data Security, Web Applications, SQL
- Status: Free Trial
Board Infinity
Skills you'll gain: Threat Detection, Cyber Operations, Cybersecurity, Incident Response, Computer Security Incident Management, Network Security, Cyber Attacks, Cyber Security Policies, Intrusion Detection and Prevention, Information Systems Security, Threat Management, Continuous Monitoring, Security Controls, Security Information and Event Management (SIEM), Firewall, System Monitoring, Endpoint Security, System Configuration, Network Monitoring, Malware Protection
Skills you'll gain: Penetration Testing, Exploitation techniques, Cybersecurity, Vulnerability Assessments, Vulnerability Scanning, Linux, Operating System Administration, Command-Line Interface, Linux Commands, Cryptography, File Management, Virtual Environment, Microsoft Windows, Scripting
Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Virtual Machines, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Command-Line Interface, Software Installation
- Status: Free Trial
Royal Holloway, University of London
Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Risk, Security Awareness, Social Sciences, Culture, Psychology, Survey Creation, Research
Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript
Coursera Project Network
Skills you'll gain: Interviewing Skills, Storytelling, Problem Solving, Professional Development, Initiative and Leadership, Concision, Verbal Communication Skills, Teamwork, Job Analysis, Communication, Business Writing
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Applied Machine Learning, Network Security, Machine Learning Algorithms, Machine Learning, Machine Learning Software, Unsupervised Learning, Supervised Learning, Artificial Neural Networks
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Marketing Analytics, Key Performance Indicators (KPIs), Marketing Effectiveness, A/B Testing, Web Analytics, Digital Marketing, Customer experience improvement, Performance Measurement, Marketing Strategies, Mobile Security, Marketing, Web Applications, Target Audience, Sales
- Status: NewStatus: Free Trial
Skills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming, Command-Line Interface
Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Open Web Application Security Project (OWASP), Exploitation techniques, Unix, Network Security, Cybersecurity, Information Systems Security, Network Analysis, Web Applications, Command-Line Interface, Virtual Machines, Web Servers
Searches related to exploitation techniques
In summary, here are 10 of our most popular exploitation techniques courses
- AI and Machine Learning Algorithms and Techniques:Â Microsoft
- Web Hacker's Toolbox - Tools Used by Successful Hackers:Â Packt
- Cisco Cybersecurity Operations Essentials:Â Board Infinity
- The Complete Pentesting and Privilege Escalation Course:Â Packt
- Pentesting Fundamentals for Beginners:Â Packt
- Cybercrime:Â Royal Holloway, University of London
- Web Hacking Expert - Full-Stack Exploitation Mastery:Â Packt
- Accomplishment STAR Techniques for Job Interviews:Â Coursera Project Network
- Machine Learning and Emerging Technologies in Cybersecurity:Â Johns Hopkins University
- Mobile Marketing, Optimization Tactics, and Analytics:Â University of California, Irvine