Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "techniques d'exploitation"
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
- Status: Free Trial
Skills you'll gain: Email Automation, Web Scraping, Robotic Process Automation, Automation, Business Process Automation, Workflow Management, Text Mining, Data Import/Export, Microsoft Excel, Microsoft Outlook
- Status: Preview
University of California, Davis
Skills you'll gain: Peer Review, Cultural Sensitivity, Analytical Skills, Detail Oriented, Verbal Communication Skills, Decision Making
- Status: Free Trial
Skills you'll gain: Penetration Testing, Exploitation techniques, Scripting, Scripting Languages, Python Programming, Cyber Operations, Object Oriented Programming (OOP), Network Security, Network Protocols, Debugging
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Video Editing, Storyboarding, Post-Production, Editing, Video Production, Animations, Writing and Editing, Typography
- Status: Free Trial
Duke University
Skills you'll gain: Predictive Modeling, Data Storytelling, Database Design, Dashboard, Predictive Analytics, MySQL, Relational Databases, SQL, Tableau Software, Business Analytics, Business Metrics, Data Visualization Software, Analytics, Data Visualization, Business Process Improvement, Business Analysis, Data Analysis, Big Data, Business Communication, Microsoft Excel
Skills you'll gain: Penetration Testing, Exploitation techniques, Cybersecurity, Vulnerability Assessments, Vulnerability Scanning, Linux, Operating System Administration, Command-Line Interface, Linux Commands, Cryptography, File Management, Virtual Environment, Microsoft Windows, Scripting
- Status: NewStatus: Free Trial
Skills you'll gain: Regression Analysis, Statistical Analysis, Time Series Analysis and Forecasting, R Programming, Statistical Hypothesis Testing, Probability & Statistics, Statistical Modeling, Statistical Methods, Predictive Modeling, Generative AI, Statistical Inference, Forecasting, Descriptive Statistics, Power BI
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Information Systems Security, Software Installation, Virtual Machines
- Status: Free Trial
DeepLearning.AI
Skills you'll gain: Generative AI, Tensorflow, Computer Vision, Image Analysis, Generative Model Architectures, Deep Learning, Keras (Neural Network Library), Artificial Neural Networks, Distributed Computing, Unsupervised Learning, Network Model, Performance Tuning, NumPy, Object Oriented Programming (OOP), Heat Maps, Network Architecture
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Computer Vision, Machine Learning Algorithms, Image Analysis, Supervised Learning, Applied Machine Learning, Feature Engineering, Data Cleansing, Scikit Learn (Machine Learning Library), Data Transformation, Predictive Modeling, Machine Learning, Data Analysis
In summary, here are 10 of our most popular techniques d'exploitation courses
- Security & Ethical Hacking: Attacking the Network:Â University of Colorado Boulder
- Automation Techniques in RPA:Â UiPath
- Wine Tasting: Sensory Techniques for Wine Analysis:Â University of California, Davis
- Advanced Exploitation and Scripting Techniques:Â Packt
- Modern Video Editing Techniques:Â University of Colorado Boulder
- Excel to MySQL: Analytic Techniques for Business:Â Duke University
- The Complete Pentesting and Privilege Escalation Course:Â Packt
- Statistical Analysis and Advanced Techniques:Â Microsoft
- Advanced Cybersecurity Techniques:Â Johns Hopkins University
- Exploitation and Penetration Testing with Metasploit:Â IBM