Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "post-exploitation techniques"
- Status: Free
Deep Teaching Solutions
Skills you'll gain: Learning Strategies, Time Management, Willingness To Learn, Mental Concentration, Creativity, Persistence, Stress Management, Self-Awareness, Adaptability
Coursera Project Network
Skills you'll gain: Marketing Analytics, Social Media Marketing, Business Marketing, Digital Marketing, Marketing Channel, Social Media Management, Customer Engagement, Gmail, Marketing Strategy and Techniques, Target Audience, Content Creation, Customer Relationship Building
Skills you'll gain: Penetration Testing, Scripting, Scripting Languages, Python Programming, Cyber Security Assessment, Cyber Operations, Computer Programming, Email Security, Cybersecurity, Malware Protection, Command-Line Interface, Program Development, TCP/IP
- Status: Free
Imperial College London
Skills you'll gain: Creative Thinking, Brainstorming, Ideation, Creativity, Resourcefulness, Curiosity, Problem Solving, Analytical Skills, Collaboration, Analysis
- Status: [object Object]
Skills you'll gain: Istio, Node.JS, Software Development Life Cycle, Unit Testing, Cloud Computing Architecture, Server Side, Application Deployment, Kubernetes, React Redux, Cloud Services, Django (Web Framework), Object-Relational Mapping, OpenShift, Git (Version Control System), Full-Stack Web Development, HTML and CSS, Cloud Computing, Jupyter, Generative AI, Interviewing Skills
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
Skills you'll gain: Generative AI, Data Wrangling, Unit Testing, Supervised Learning, Feature Engineering, ChatGPT, Keras (Neural Network Library), Unsupervised Learning, Natural Language Processing, Data Cleansing, Jupyter, Data Analysis, Deep Learning, Data Manipulation, PyTorch (Machine Learning Library), Data Transformation, Artificial Intelligence, Data Import/Export, Data Ethics, Exploratory Data Analysis
L&T EduTech
Skills you'll gain: Geospatial Information and Technology, Spatial Analysis, GIS Software, Spatial Data Analysis, Geographic Information Systems, Geospatial Mapping, Database Management, Database Management Systems, Construction Management, ArcGIS, Relational Databases, Visualization (Computer Graphics), Heat Maps, Civil and Architectural Engineering, Global Positioning Systems, Decision Support Systems, Building Information Modeling, As-Built Drawings, Survey Creation, AutoCAD Civil 3D
- Status: Free
Skills you'll gain: Web Scraping, Robotic Process Automation, Email Security, Automation, Business Process Automation, IT Automation, Data Import/Export, Unstructured Data, Spreadsheet Software
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
- Status: [object Object]
Skills you'll gain: Data Storytelling, Dashboard, Data Visualization Software, Plotly, Data Presentation, Data Wrangling, Data Visualization, SQL, Generative AI, Interactive Data Visualization, Exploratory Data Analysis, Data Cleansing, Big Data, Jupyter, Matplotlib, Data Analysis, Statistical Analysis, Pandas (Python Package), Excel Formulas, Professional Networking
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
In summary, here are 10 of our most popular post-exploitation techniques courses
- Learning How to Learn: Powerful mental tools to help you master tough subjects:Â Deep Teaching Solutions
- Small Business Marketing Using YouTube:Â Coursera Project Network
- Advanced Exploitation and Scripting Techniques:Â Packt
- Creative Thinking: Techniques and Tools for Success:Â Imperial College London
- IBM Full Stack Software Developer:Â IBM
- Google Cybersecurity:Â Google
- IBM Generative AI Engineering:Â IBM
- Geospatial Techniques for Engineers:Â L&T EduTech
- Automation Techniques in RPA:Â UiPath
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM