Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "post-exploitation techniques"
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, Network Architecture, Routing Protocols, Network Protocols, OSI Models, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Software Design, Programming Principles, Debugging, Program Development, C (Programming Language), Software Development Methodologies
Vanderbilt University
Skills you'll gain: ChatGPT, Creative Problem-Solving, Generative AI, Image Analysis, Data Capture, Artificial Intelligence, Innovation, OpenAI, Data Analysis, Organizational Skills, Teaching, Interactive Learning, Instructional Strategies, Lesson Planning, Computer Vision, Data Storytelling, Creative Thinking, Student Engagement, Creativity, Natural Language Processing
University of Pennsylvania
Skills you'll gain: Risk Modeling, Financial Statements, Probability Distribution, Mathematical Modeling, Statistical Modeling, Portfolio Management, Regression Analysis, Business Modeling, Financial Modeling, Risk Management, Quantitative Research, Presentations, Decision Making, Data Visualization, Microsoft PowerPoint, Predictive Modeling, Investment Management, Spreadsheet Software, Google Sheets, Excel Formulas
Duke University
Skills you'll gain: Object Oriented Programming (OOP), Java, Hypertext Markup Language (HTML), Software Design, Data Structures, Debugging, Web Design and Development, Software Engineering, Cryptography, Cascading Style Sheets (CSS), Web Development, Programming Principles, Javascript, Encryption, Algorithms, Program Development, Web Applications, Front-End Web Development, Statistical Analysis, Computer Programming
- Status: Free
Georgia Institute of Technology
Skills you'll gain: User Experience Design, Prototyping, User Centered Design, Usability, Requirements Analysis, User Interface (UI), Interaction Design, Usability Testing, User Research
Multiple educators
Skills you'll gain: Unit Testing, Data Structures, Event-Driven Programming, Interactive Data Visualization, Java, Java Programming, Object Oriented Programming (OOP), Development Testing, User Interface (UI), Debugging, Software Testing, Cryptography, Computer Programming, Performance Tuning, Encryption, Algorithms, Graphical Tools, Software Engineering, Program Development, Programming Principles
- Status: [object Object]
Skills you'll gain: Istio, Node.JS, Software Development Life Cycle, Unit Testing, Cloud Computing Architecture, Server Side, Application Deployment, Kubernetes, React Redux, Cloud Services, Django (Web Framework), Object-Relational Mapping, OpenShift, Git (Version Control System), Full-Stack Web Development, HTML and CSS, Cloud Computing, Jupyter, Generative AI, Interviewing Skills
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
Skills you'll gain: Stakeholder Engagement, Software Development Life Cycle, Agile Software Development, Project Management Life Cycle, Resource Management, Risk Management, Peer Review, Earned Value Management, Stakeholder Management, Agile Methodology, Project Risk Management, Team Motivation, Kanban Principles, Project Schedules, Development Environment, Project Management Institute (PMI) Methodology, Information Technology, Sprint Retrospectives, Interviewing Skills, Project Management
Skills you'll gain: Spreadsheet Software, Stakeholder Communications, Dashboard, Stakeholder Management, Data-Driven Decision-Making, Data Analysis, Analytical Skills, Data Presentation, Business Analysis, Quantitative Research, Systems Thinking
Skills you'll gain: Network Security, Encryption, Cybersecurity, Security Awareness, Cyber Attacks, Security Management, Security Strategy, Threat Detection, Firewall, Wireless Networks, Technical Support, Malware Protection, Authentications, Multi-Factor Authentication, Authorization (Computing), Generative AI
In summary, here are 10 of our most popular post-exploitation techniques courses
- The Bits and Bytes of Computer Networking:Â Google
- Principles of Secure Coding:Â University of California, Davis
- Prompt Engineering for Educators:Â Vanderbilt University
- Business and Financial Modeling:Â University of Pennsylvania
- Java Programming and Software Engineering Fundamentals:Â Duke University
- Introduction to User Experience Design :Â Georgia Institute of Technology
- Object Oriented Programming in Java:Â Duke University
- IBM Full Stack Software Developer:Â IBM
- Sound the Alarm: Detection and Response:Â Google
- IBM IT Project Manager:Â IBM