Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "entwicklung von exploits"
- Status: New
Skills you'll gain: Open Web Application Security Project (OWASP), DevSecOps, Security Testing, CI/CD, DevOps, Application Security, Continuous Integration, Secure Coding, Continuous Delivery, Regulatory Compliance, Security Engineering, Vulnerability Assessments, Penetration Testing, Vulnerability Management, Compliance Auditing
- Status: NewStatus: Free Trial
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Vulnerability Assessments, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
- Status: New
Skills you'll gain: Google Gemini, Debugging, Unit Testing, Code Review, Integrated Development Environments, Software Development Tools, Software Documentation, Cloud Development, Application Development, Maintainability, Software Testing
- Status: New
Google Cloud
Skills you'll gain: Google Gemini, Google Workspace, Generative AI Agents, Prompt Engineering, File Management
Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript
- Status: NewStatus: Free Trial
Skills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming, Command-Line Interface
What brings you to Coursera today?
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Information Systems Security, Software Installation, Virtual Machines
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, OSI Models, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Network Protocols, Network Security, Vulnerability Scanning, Cybersecurity, Prompt Engineering, Large Language Modeling, Scripting, Python Programming, SQL
- Status: Preview
Johns Hopkins University
Skills you'll gain: Data Science, Data Management, Data Analysis, Data-Driven Decision-Making, Data Presentation, Exploratory Data Analysis, Machine Learning, Predictive Modeling, Statistical Inference
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Application Security, Exploitation techniques, Security Awareness, Malware Protection, Vulnerability Assessments, Javascript, Web Servers
- Status: New
Skills you'll gain: Generative AI, Google Gemini, Large Language Modeling, Prompt Engineering, Responsible AI, LLM Application, Google Cloud Platform, Big Data, Database Development
- Status: New
Skills you'll gain: Security Strategy, Responsible AI, Risking, Law, Regulation, and Compliance, Personally Identifiable Information, Threat Modeling, Data Security, Security Management, Information Assurance, Infrastructure Security, Cybersecurity, Artificial Intelligence
In summary, here are 10 of our most popular entwicklung von exploits courses
- Securing Your DevOps Pipelines:Â Pearson
- Security and Ethical Hacking:Â University of Colorado Boulder
- Anwendungsentwicklung mit Gemini Code Assist optimieren:Â Google Cloud
- Gemini in Google Drive - Deutsch:Â Google Cloud
- Web Hacking Expert - Full-Stack Exploitation Mastery:Â Packt
- Exploit Development, Malware, & Defensive Strategies:Â Packt
- Exploitation and Penetration Testing with Metasploit:Â IBM
- Advanced Web Exploits, Python Scripting & Network Attacks:Â Packt
- Ein Crashkurs in Datenwissenschaft:Â Johns Hopkins University
- Web Security, Social Engineering & External Attacks:Â Packt