Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "entwicklung von exploits"
Status: NewStatus: Free TrialSkills you'll gain: Security Controls, Continuous Monitoring, Authorization (Computing), Anomaly Detection
Status: Free TrialSkills you'll gain: Responsible AI, Generative AI, Large Language Modeling, Artificial Intelligence, PyTorch (Machine Learning Library), MLOps (Machine Learning Operations), Tensorflow, Information Privacy, Machine Learning, A/B Testing, Deep Learning, Version Control, Performance Tuning, Scalability

Duke University
Skills you'll gain: Containerization, Application Deployment, Microservices, Rust (Programming Language), Unit Testing, Cloud Applications, Cloud Platforms, Development Environment, Application Frameworks, Restful API, Algorithms
Status: PreviewSkills you'll gain: Microsoft Copilot, Microsoft Power Automate/Flow, Microsoft Power Platform, Microsoft 365, Security Management, Threat Detection, Compliance Management, Artificial Intelligence, Business Process Automation, Automation, Incident Response, Generative AI
Status: NewStatus: Free TrialSkills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Network Security, Open Web Application Security Project (OWASP), SQL

Skills you'll gain: Penetration Testing, Exploitation techniques, Network Security, Intrusion Detection and Prevention, Threat Detection, General Networking, Vulnerability Management, Linux, Linux Administration, Virtual Machines, Network Analysis
Status: NewStatus: Free TrialSkills you'll gain: Penetration Testing, Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Testing, Cyber Attacks, MITRE ATT&CK Framework, Exploit development, Encryption, Vulnerability Scanning, Web Applications, Infrastructure Security, Wireless Networks, Internet Of Things
Status: Free TrialSkills you'll gain: Kubernetes, CI/CD, Application Deployment, DevOps, Continuous Integration, Containerization, Continuous Deployment, Package and Software Management, YAML, Git (Version Control System), Command-Line Interface
Status: Free TrialJohns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Cyber Operations, Security Testing, Vulnerability Scanning, Network Security, Operating Systems, Encryption
Status: Free TrialUniversity of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
Status: NewStatus: PreviewCoursera Instructor Network
Skills you'll gain: Scalability, Microservices, Cloud-Native Computing, Kubernetes, System Monitoring, Application Security, Service Management, Security Controls, Security Engineering, IT Service Management, Identity and Access Management, Software-Defined Networking, Configuration Management
Status: PreviewUniversity of Illinois Urbana-Champaign
Skills you'll gain: Statistical Inference, Sampling (Statistics), Descriptive Statistics, Probability Distribution, Statistics, Statistical Analysis, Data Analysis, Probability & Statistics, Microsoft Excel, Statistical Visualization, Graphing, Influencing
In summary, here are 10 of our most popular entwicklung von exploits courses
- Microsoft Security Solutions Capabilities:Â Whizlabs
- NVIDIA: LLM Experimentation, Deployment, and Ethical AI:Â Whizlabs
- Rust Axum Greedy Coin Microservice:Â Duke University
- Microsoft Copilot: Power Platform & Security Best Practices:Â Whizlabs
- Practical Cybersecurity Fundamentals: Unit 3:Â Pearson
- Learn Man in the Middle Attacks from Scratch:Â Packt
- Ethical Hacking Essentials: Hands-On Edition:Â EC-Council
- Kubernetes Integration and Advanced Orchestration Techniques:Â LearnQuest
- Introduction to Ethical Hacking:Â Johns Hopkins University
- Security & Ethical Hacking: Attacking Unix and Windows :Â University of Colorado Boulder










