Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "system hacking"
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Application Security, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Skills you'll gain: File Systems, Operating Systems, OS Process Management, C (Programming Language), System Programming, Unix, Virtualization, Data Integrity, Debugging, Systems Design, Performance Tuning, Distributed Computing, Data Storage, Virtual Machines, Command-Line Interface, Computer Systems, Computer Hardware, Scalability, Data Structures, Linux
DeepLearning.AI
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Artificial Neural Networks, Applied Machine Learning, Artificial Intelligence, Network Architecture, Machine Learning, Data Processing, Algorithms
- Status: Free
Peking University
Skills you'll gain: File Systems, Operating Systems, OS Process Management, System Software, Computer Systems, Unix, Performance Tuning, Data Storage, Linux, Algorithms
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Cybersecurity, Configuration Management, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Security Awareness, Cloud Platforms, Encryption
University of Michigan
Skills you'll gain: Web Scraping, Data Processing, Relational Databases, JSON, Database Design, SQL, Network Protocols, Databases, Web Services, Restful API, Interactive Data Visualization, Programming Principles, Data Cleansing, Data Structures, Data Collection, Computer Programming, Python Programming, Data Manipulation, Development Environment, Computational Thinking
University of Colorado Boulder
Skills you'll gain: Software Configuration Management, Embedded Software, Embedded Systems, Git (Version Control System), Version Control, System Programming, Build Tools, Software Development Tools, C (Programming Language), Development Environment, Code Review, Computer Architecture, Debugging, Command-Line Interface
Skills you'll gain: Analytics, Business Analytics, Data Analysis, Microsoft PowerPoint, Data Presentation, Presentations, Excel Formulas, Data-Driven Decision-Making, Dashboard, Data Storytelling, Business Intelligence, Microsoft Excel, Customer Analysis, Data Visualization, Data Visualization Software, Big Data, Target Market, Data Cleansing, Public Speaking, Spreadsheet Software
Skills you'll gain: Data Storytelling, Data Presentation, Data Visualization, Interactive Data Visualization, Big Data, Data Visualization Software, Data Analysis, IBM Cognos Analytics, Statistical Analysis, Data Mining, Dashboard, Apache Hadoop, Data Collection, Tree Maps, Excel Formulas, Apache Hive, Microsoft Excel, Data Quality, Data Cleansing, Data Import/Export
- Status: Free
UNSW Sydney (The University of New South Wales)
Skills you'll gain: Systems Engineering, Engineering Management, Conceptual Design, Systems Design, Requirements Analysis, Systems Development Life Cycle, Requirements Elicitation, Systems Architecture, Systems Integration, System Design and Implementation, Technical Design, Configuration Management, Prototyping, Verification And Validation
Infosec
Skills you'll gain: Penetration Testing, Linux Commands, Command-Line Interface, Linux, Cybersecurity, Operating Systems, Windows PowerShell, Unix Commands, Microsoft Windows, Computer Systems, File Systems, Mac OS, OS Process Management
Searches related to system hacking
In summary, here are 10 of our most popular system hacking courses
- Fundamentals of Computer Network Security: University of Colorado System
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Introduction to Operating Systems: Codio
- Convolutional Neural Networks: DeepLearning.AI
- 操作系统原理(Operating Systems): Peking University
- IBM and ISC2 Cybersecurity Specialist: IBM
- Python for Everybody: University of Michigan
- Introduction to Embedded Systems Software and Development Environments: University of Colorado Boulder
- Data Analysis and Presentation Skills: the PwC Approach: PwC
- Data Analysis and Visualization Foundations: IBM