Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "post-exploitation techniques"
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
University of Toronto
Skills you'll gain: Data Ethics, Data Collection, Quantitative Research, Qualitative Research, Data Analysis, Statistical Analysis, Analytical Skills, Regression Analysis, Focus Group, Correlation Analysis, Diversity and Inclusion, Research Methodologies, Customer Insights, Law, Regulation, and Compliance, Probability, Stakeholder Engagement
Skills you'll gain: Linux Commands, Linux, Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Security Testing, Scripting, Vulnerability Assessments, Scripting Languages, Intrusion Detection and Prevention, General Networking, Python Programming, Network Security, Cybersecurity, Firewall, Application Security, Web Applications, Cyber Operations, Data Ethics, Computer Programming
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, MySQL, PostgreSQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Transformation, IBM DB2, Relational Databases, Jupyter, Generative AI
Vanderbilt University
Skills you'll gain: ChatGPT, Ideation, Verification And Validation, Data Presentation, Generative AI, Document Management, Creative Thinking, Creativity, Image Analysis, Data Capture, Artificial Intelligence, OpenAI, Data Analysis, Organizational Skills, Risk Management Framework, Computer Vision, Productivity Software, Microsoft Excel, Data Storytelling, Creative Problem-Solving
DeepLearning.AI
Skills you'll gain: Tensorflow, Computer Vision, Image Analysis, Keras (Neural Network Library), Natural Language Processing, Time Series Analysis and Forecasting, Deep Learning, Applied Machine Learning, Predictive Modeling, Artificial Intelligence and Machine Learning (AI/ML), Artificial Neural Networks, Text Mining, Forecasting, Machine Learning, Supervised Learning, Data Processing, Data Transformation
- Status: Free
Deep Teaching Solutions
Skills you'll gain: Learning Strategies, Time Management, Willingness To Learn, Mental Concentration, Creativity, Persistence, Self-Discipline, Stress Management, Self-Awareness, Adaptability
Skills you'll gain: Anomaly Detection, Image Analysis, Computer Vision, Matlab, Deep Learning, Applied Machine Learning, Application Deployment, PyTorch (Machine Learning Library), Artificial Intelligence and Machine Learning (AI/ML), Data Synthesis, Data Manipulation
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Security Controls, Security Testing, Virtual Machines, Application Security, Technical Documentation, Data Security, Web Servers, Linux
Johns Hopkins University
Skills you'll gain: Computer Vision, Machine Learning Algorithms, Image Analysis, Supervised Learning, Applied Machine Learning, Feature Engineering, Data Cleansing, Scikit Learn (Machine Learning Library), Data Transformation, Predictive Modeling, Machine Learning, Data Analysis, Regression Analysis
Skills you'll gain: ChatGPT, Generative AI, Exploratory Data Analysis, Data Ethics, OpenAI, Feature Engineering, Predictive Modeling, Artificial Intelligence, IBM Cloud, Data Storytelling, Data Modeling, Artificial Intelligence and Machine Learning (AI/ML), Predictive Analytics, Data Science, Data Analysis, Data Transformation, Data Visualization Software, Software Development Tools, Image Analysis, Technical Communication
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Security Management, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Cyber Attacks, Malware Protection, Email Security, Vulnerability Management, Artificial Intelligence
In summary, here are 10 of our most popular post-exploitation techniques courses
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- Inclusive Analytic Techniques:Â University of Toronto
- The Complete Ethical Hacking Bootcamp: Beginner To Advanced:Â Packt
- IBM Relational Database Administrator:Â IBM
- Generative AI Automation:Â Vanderbilt University
- DeepLearning.AI TensorFlow Developer:Â DeepLearning.AI
- Learning How to Learn: Powerful mental tools to help you master tough subjects:Â Deep Teaching Solutions
- Advanced Deep Learning Techniques for Computer Vision:Â MathWorks
- Offensive Hacking Unfolded - Become a Pro Pentester:Â Packt
- Applied Machine Learning: Techniques and Applications:Â Johns Hopkins University