Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "post-exploitation techniques"
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
- Status: Free
Coursera Project Network
Skills you'll gain: Interviewing Skills, Storytelling, Problem Solving, Professional Development, Persuasive Communication, Initiative and Leadership, Concision, Verbal Communication Skills, Teamwork, Job Analysis, Communication
Skills you'll gain: MySQL, Database Design, Version Control, Database Management Systems, MySQL Workbench, Extract, Transform, Load, Stored Procedure, Data Modeling, Data Structures, SQL, Database Theory, Unix Commands, Relational Databases, Databases, Git (Version Control System), Object Oriented Programming (OOP), Database Management, Unit Testing, Algorithms, Django (Web Framework)
Skills you'll gain: Extract, Transform, Load, Power BI, Data Integrity, Data Validation, Data Transformation, Data Cleansing, Microsoft Power Platform, Data Storage, Data Analysis, Data Integration, Data Import/Export, Business Intelligence
Google
Skills you'll gain: Scripting, Python Programming, Computer Programming, Algorithms, Problem Management, Data Structures, Debugging, Development Environment
DeepLearning.AI
Skills you'll gain: Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Applied Machine Learning, Machine Learning, Debugging, Supervised Learning, Data-Driven Decision-Making, Performance Tuning
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Skills you'll gain: ChatGPT, Generative AI, Artificial Intelligence, OpenAI, Workflow Management, Deep Learning, Business Workflow Analysis, Artificial Neural Networks, Governance, Machine Learning, Application Deployment, Business Transformation, IBM Cloud, Business Technologies, Artificial Intelligence and Machine Learning (AI/ML), Ethical Standards And Conduct, Computer Vision, Business Logic, Software Development Tools, Image Analysis
- Status: Free
Georgia Institute of Technology
Skills you'll gain: User Experience Design, Prototyping, User Centered Design, Usability, Requirements Analysis, User Interface (UI), Interaction Design, Usability Testing, User Research
Vanderbilt University
Skills you'll gain: ChatGPT, Ideation, Verification And Validation, Generative AI, Document Management, Creative Thinking, Image Analysis, Data Capture, Artificial Intelligence, OpenAI, Data Analysis, Organizational Skills, Risk Management Framework, Computer Vision, Productivity Software, Microsoft Excel, Creativity, Data Ethics, Information Management, Natural Language Processing
Skills you'll gain: Quality Management, Project Closure, Project Management, Continuous Improvement Process, Project Controls, Quality Monitoring, Team Management, Project Risk Management, Data-Driven Decision-Making, Project Documentation, Stakeholder Communications, Technical Communication, Meeting Facilitation, Communication
Skills you'll gain: Agile Software Development, Cloud Computing Architecture, Cloud Services, Agile Methodology, DevOps, Kanban Principles, Cloud Security, Cloud Infrastructure, Cloud Platforms, Cloud Computing, Agile Project Management, Cloud-Native Computing, User Story, Cloud Storage, Sprint Retrospectives, Sprint Planning, Workflow Management, CI/CD, Test Driven Development (TDD), Scrum (Software Development)
In summary, here are 10 of our most popular post-exploitation techniques courses
- Sound the Alarm: Detection and Response:Â Google
- Accomplishment STAR Techniques for Job Interviews:Â Coursera Project Network
- Meta Database Engineer:Â Meta
- Extract, Transform and Load Data in Power BI:Â Microsoft
- Crash Course on Python:Â Google
- Structuring Machine Learning Projects:Â DeepLearning.AI
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- AI Foundations for Everyone:Â IBM
- Introduction to User Experience Design :Â Georgia Institute of Technology
- Generative AI Automation:Â Vanderbilt University