Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "phishing and fake email creation"
- Status: Free
Coursera Project Network
Skills you'll gain: Email Marketing, Newsletters, Direct Marketing, Campaign Management, Content Marketing, Marketing Materials, Target Audience
Skills you'll gain: Project Scoping, Project Documentation, Project Management Life Cycle, Project Management, Goal Setting, Project Management Software, Stakeholder Management, Cost Benefit Analysis, Resource Management, Accountability
University of Michigan
Skills you'll gain: Programming Principles, Computer Programming, Python Programming, Software Installation, Development Environment
University of Michigan
Skills you'll gain: Data Structures, Python Programming, Programming Principles, Data Import/Export, Data Manipulation, Development Environment, File Management
Skills you'll gain: Large Language Modeling, Data Literacy, Data Mining, Artificial Intelligence, Generative AI, Data Ethics, Artificial Intelligence and Machine Learning (AI/ML), Big Data, Information Architecture, Strategic Decision-Making, Enterprise Architecture, Cloud Computing, Applied Machine Learning, Data Analysis, Data Science, Deep Learning, Digital Transformation, Data Strategy, Business Strategy, Business Process Automation
Google
Skills you'll gain: Prompt Engineering, Generative AI, Productivity Software, Artificial Intelligence, Computer Security Awareness Training, Operational Efficiency, Innovation, Human Machine Interfaces, Information Privacy, Machine Learning, Content Creation, Business Ethics
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Wrangling, Data Visualization, Plot (Graphics), Statistical Programming, Ggplot2, Big Data, Git (Version Control System), Data Integration, Knitr, Data Analysis, Data Sharing, Statistical Reporting
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, Peripheral Devices, Cybersecurity, Configuration Management, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Cloud Platforms, Encryption, Data Storage
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption
Skills you'll gain: Spreadsheet Software, Stakeholder Communications, Dashboard, Data-Driven Decision-Making, Data Analysis, Analytical Skills, Data Presentation, Business Analysis, Expectation Management, Quantitative Research, Communication
DeepLearning.AI
Skills you'll gain: Tensorflow, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Performance Tuning, Artificial Neural Networks, Machine Learning Algorithms, Analysis, Debugging
Duke University
Skills you'll gain: Hypertext Markup Language (HTML), HTML and CSS, Cascading Style Sheets (CSS), Web Development, Programming Principles, Javascript, Web Design, Computer Programming, Image Analysis, Computational Thinking, Algorithms, Debugging
In summary, here are 10 of our most popular phishing and fake email creation courses
- Use Mailchimp to Build an E-mail Marketing Campaign: Coursera Project Network
- Project Initiation: Starting a Successful Project: Google
- Programming for Everybody (Getting Started with Python): University of Michigan
- Python Data Structures: University of Michigan
- IBM AI Foundations for Business: IBM
- Google AI Essentials: Google
- Data Science: Foundations using R: Johns Hopkins University
- IBM and ISC2 Cybersecurity Specialist: ISC2
- Assets, Threats, and Vulnerabilities: Google
- Ask Questions to Make Data-Driven Decisions: Google