Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "post-exploitation techniques"
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
EC-Council
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Security Awareness, Cyber Threat Intelligence, Cybersecurity, Intrusion Detection and Prevention, Cyber Attacks, Application Security, Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
DeepLearning.AI
Skills you'll gain: Computer Vision, Deep Learning, Image Analysis, Natural Language Processing, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Tensorflow, Supervised Learning, Keras (Neural Network Library), Artificial Intelligence, Applied Machine Learning, PyTorch (Machine Learning Library), Machine Learning, Debugging, Performance Tuning, Machine Learning Methods, Python Programming, Data-Driven Decision-Making, Text Mining, Network Architecture
Vanderbilt University
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, OpenAI, Expense Management, Artificial Intelligence, Personalized Service, Expense Reports, Workflow Management, Artificial Intelligence and Machine Learning (AI/ML), Google Workspace, Creative Thinking, Productivity Software, Creativity, Business Process Automation, Digital Transformation, Google Sheets, Automation, Innovation, Natural Language Processing, Test Case
- Status: [object Object]
Microsoft
Skills you'll gain: Data Storytelling, Dashboard, Excel Formulas, Extract, Transform, Load, Power BI, Data Analysis Expressions (DAX), Microsoft Excel, Data Modeling, Data-Driven Decision-Making, Star Schema, Data Analysis, Data Presentation, Data Visualization Software, Microsoft Power Platform, Data Integrity, Spreadsheet Software, Data Validation, Data Transformation, Data Cleansing, Data Visualization
- Status: Free
Eindhoven University of Technology
Skills you'll gain: Business Process, Process Analysis, Process Improvement, Business Process Management, Data Mining, Business Process Modeling, Process Optimization, Operational Analysis, Performance Analysis, Data Analysis, Real Time Data, Data Science, Verification And Validation
DeepLearning.AI
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Artificial Neural Networks, Applied Machine Learning, Artificial Intelligence, Network Architecture, Machine Learning, Data Processing, Algorithms
University of Michigan
Skills you'll gain: Text Mining, Natural Language Processing, Data Processing, Unstructured Data, Feature Engineering, Data Manipulation, Data Cleansing, Python Programming, Unsupervised Learning, Machine Learning Algorithms, Supervised Learning
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
Multiple educators
Skills you'll gain: Unsupervised Learning, Supervised Learning, Classification And Regression Tree (CART), Artificial Intelligence and Machine Learning (AI/ML), Machine Learning Algorithms, Machine Learning, Jupyter, Data Ethics, Decision Tree Learning, Tensorflow, Scikit Learn (Machine Learning Library), NumPy, Predictive Modeling, Deep Learning, Artificial Intelligence, Reinforcement Learning, Random Forest Algorithm, Feature Engineering, Python Programming, Artificial Neural Networks
Skills you'll gain: Bash (Scripting Language), Linux Commands, Linux, File Management, Unix Commands, Command-Line Interface, IT Automation, Scripting, Operating Systems, Development Testing, OS Process Management, Unit Testing, Automation, Python Programming, Test Driven Development (TDD), Debugging, Development Environment
In summary, here are 10 of our most popular post-exploitation techniques courses
- Sound the Alarm: Detection and Response:Â Google
- Ethical Hacking Essentials (EHE):Â EC-Council
- Deep Learning:Â DeepLearning.AI
- Generative AI and ChatGPT for K-12 Educators:Â Vanderbilt University
- ChatGPT: Excel at Personal Automation with GPTs, AI & Zapier:Â Vanderbilt University
- Microsoft Power BI Data Analyst:Â Microsoft
- Process Mining: Data science in Action:Â Eindhoven University of Technology
- Convolutional Neural Networks:Â DeepLearning.AI
- Applied Text Mining in Python:Â University of Michigan
- Incident Response and Digital Forensics:Â IBM