Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "os vulnerability exploitation and mitigation"
University of California, Irvine
Skills you'll gain: Grammar
Skills you'll gain: Spreadsheet Software, Stakeholder Communications, Dashboard, Stakeholder Management, Data-Driven Decision-Making, Data Analysis, Analytical Skills, Data Presentation, Business Analysis, Quantitative Research, Systems Thinking
- Status: New
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Administration, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Transformation, Data Architecture, Jupyter, Generative AI, Relational Databases, Database Design, Automation
Skills you'll gain: Project Management Life Cycle, Change Management, Organizational Structure, Project Management, Organizational Skills, Agile Methodology, Waterfall Methodology, Communication, Interpersonal Communications, Decision Making
University of Virginia
Skills you'll gain: Design Thinking, Digital Transformation, Creative Problem-Solving, New Product Development, Ideation, Business Transformation, Product Management, Technology Strategies, Agile Product Development, Innovation, Creativity, Product Lifecycle Management, Strategic Thinking, Product Improvement, Human Centered Design, Information Technology, Competitive Analysis, Business Analysis, Business Strategy, Cyber Risk
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Security, Cloud Infrastructure, Data Mining, Cloud Platforms, Cloud Computing, Artificial Intelligence, Generative AI, Data Ethics, Cloud Storage, Artificial Intelligence and Machine Learning (AI/ML), Infrastructure As A Service (IaaS), Big Data, Emerging Technologies, Data Analysis, Data Science, Deep Learning, Digital Transformation, Artificial Neural Networks
- Status: Free
Universiteit Leiden
Skills you'll gain: Public Safety and National Security, Research, Research Methodologies, Policy Analysis, Media and Communications, Social Studies, International Relations, Political Sciences, Trend Analysis, Investigation, Psychology
University of Michigan
Skills you'll gain: Data Structures, Python Programming, Data Manipulation, Development Environment, File Management, Data Analysis, Computer Programming, Software Installation
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Cloud Services, Debugging, Puppet (Configuration Management Tool), Infrastructure as Code (IaC), Bash (Scripting Language), Configuration Management, Test Automation, CI/CD, Cloud Infrastructure, Cloud Computing, Technical Communication, Scripting, Network Troubleshooting, Web Services, Python Programming, Restful API, Computer Programming
Skills you'll gain: Data Storytelling, Data Presentation, Data Visualization, Interactive Data Visualization, Data Visualization Software, Dashboard, IBM Cognos Analytics, Tree Maps, Scatter Plots, Data Analysis, Pivot Tables And Charts, Microsoft Excel, Histogram
Google
Skills you'll gain: Generative AI, Artificial Intelligence and Machine Learning (AI/ML), Productivity Software, Artificial Intelligence, Data Ethics, Security Awareness, Business Workflow Analysis, Innovation, Automation, Workflow Management, Information Privacy, Human Computer Interaction, Content Creation, Natural Language Processing, Complex Problem Solving
Skills you'll gain: Data Storytelling, Data Presentation, Data Visualization, Interactive Data Visualization, Big Data, Data Visualization Software, Data Analysis, IBM Cognos Analytics, Statistical Analysis, Data Mining, Dashboard, Apache Hadoop, Data Collection, Tree Maps, Excel Formulas, Apache Hive, Microsoft Excel, Data Quality, Data Cleansing, Data Import/Export
In summary, here are 10 of our most popular os vulnerability exploitation and mitigation courses
- Grammar and Punctuation: University of California, Irvine
- Ask Questions to Make Data-Driven Decisions: Google
- IBM Relational Database Administrator: IBM
- Foundations of Project Management: Google
- Leading the Modern Day Business: University of Virginia
- Key Technologies for Business: IBM
- Terrorism and Counterterrorism: Comparing Theory and Practice: Universiteit Leiden
- Python Data Structures: University of Michigan
- Google IT Automation with Python: Google
- Data Visualization and Dashboards with Excel and Cognos: IBM