Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "post-exploitation techniques"
Skills you'll gain: Bash (Scripting Language), Linux Commands, Linux, File Management, Unix Commands, Command-Line Interface, IT Automation, Scripting, Operating Systems, Development Testing, OS Process Management, Unit Testing, Automation, Python Programming, Test Driven Development (TDD), Debugging, Development Environment
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, Network Architecture, Routing Protocols, Network Protocols, OSI Models, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks
Google
Skills you'll gain: Scripting, Python Programming, Computer Programming, Algorithms, Problem Management, Data Structures, Debugging, Development Environment
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, OpenAI, Artificial Intelligence, Personalized Service, Expense Management, Artificial Intelligence and Machine Learning (AI/ML), Creative Thinking, Productivity Software, Digital Transformation, Business Process Automation, Applied Machine Learning, Creative Problem-Solving, Expense Reports, Innovation, Natural Language Processing, Test Case, Scenario Testing, Technical Communication, Data Analysis
- Status: [object Object]
Skills you'll gain: NoSQL, Data Warehousing, SQL, Apache Hadoop, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, IBM Cognos Analytics, MySQL, Apache Spark, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Jupyter, Generative AI, Professional Networking
Skills you'll gain: MySQL, Database Design, Version Control, Database Management Systems, MySQL Workbench, Extract, Transform, Load, Stored Procedure, Data Modeling, Data Structures, SQL, Database Theory, Unix Commands, Relational Databases, Databases, Git (Version Control System), Object Oriented Programming (OOP), Database Management, Database Development, Unit Testing, Algorithms
Skills you'll gain: Malware Protection, Cyber Threat Hunting, Application Security, Cybersecurity, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Windows PowerShell, Virtualization, Operating Systems, Programming Principles, Computer Architecture, Linux
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Security Management, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Cyber Attacks, Malware Protection, Email Security, Vulnerability Management, Artificial Intelligence
Skills you'll gain: Data Cleansing, Sampling (Statistics), Data Integrity, Data Quality, Data Validation, Google Sheets, Data Analysis, Data Manipulation, SQL, Data Transformation, Spreadsheet Software, Microsoft Excel
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Puppet (Configuration Management Tool), CI/CD, Containerization, Debugging, Bash (Scripting Language), Infrastructure as Code (IaC), Docker (Software), Continuous Deployment, Continuous Integration, Technical Communication, Network Troubleshooting, Linux Commands, Linux, Scripting, Automation, Python Programming, Computer Programming
Skills you'll gain: Open Web Application Security Project (OWASP), Istio, Software Development Life Cycle, Linux Commands, Unit Testing, Application Deployment, Kubernetes, NoSQL, Bash (Scripting Language), MongoDB, Shell Script, Django (Web Framework), Object-Relational Mapping, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Jupyter, Grafana
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, MySQL, PostgreSQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Transformation, IBM DB2, Relational Databases, Jupyter, Generative AI
In summary, here are 10 of our most popular post-exploitation techniques courses
- Using Python to Interact with the Operating System:Â Google
- The Bits and Bytes of Computer Networking:Â Google
- Crash Course on Python:Â Google
- ChatGPT: Master Free AI Tools to Supercharge Productivity:Â Vanderbilt University
- IBM Data Engineering:Â IBM
- Meta Database Engineer:Â Meta
- Malware Analysis and Introduction to Assembly Language:Â IBM
- Cybersecurity Case Studies and Capstone Project:Â IBM
- Process Data from Dirty to Clean:Â Google
- Google IT Automation with Python:Â Google