Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "identifying and mitigating social engineering attacks"
- Status: New
University of California, Santa Cruz
Skills you'll gain: C++ (Programming Language), Go (Programming Language), Data Structures, Object Oriented Programming (OOP), Software Design Patterns, Debugging, Object Oriented Design, Programming Principles, Unit Testing, Algorithms, C (Programming Language), Program Development, Integrated Development Environments, Computer Programming, Software Testing, Computer Science, Graph Theory, File Management, Artificial Intelligence, Integration Testing
- Status: Free
École Polytechnique Fédérale de Lausanne
Skills you'll gain: Sanitation, Water Resources, Public Health, Emergency Response, Program Evaluation, Health Policy, Environmental Monitoring, Infectious Diseases, Governance, Microbiology
University of Michigan
Skills you'll gain: Cascading Style Sheets (CSS), Web Content Accessibility Guidelines, HTML and CSS, Web Design, Hypertext Markup Language (HTML), Responsive Web Design, Usability, Browser Compatibility, Javascript, Debugging
Google
Skills you'll gain: Object Oriented Programming (OOP), Data Analysis, Data Structures, Jupyter, Python Programming, NumPy, Pandas (Python Package), Programming Principles, Scripting, Data Manipulation, Algorithms
University of Illinois Urbana-Champaign
Skills you'll gain: Financial Systems, Banking, Risk Management, FinTech, Retail Banking, Financial Regulations, Financial Services, Commercial Banking, Operational Risk, Credit Risk, Payment Systems, Financial Market, Balance Sheet
University of Colorado System
Skills you'll gain: Database Design, Data Warehousing, Relational Databases, Decision Support Systems, Business Intelligence, Data Modeling, Database Management Systems, Databases, Dashboard, Business Process Management, SQL, Star Schema, Data Governance, Data Integration, Oracle Databases, Performance Measurement, Extract, Transform, Load, Business Analytics, MicroStrategy, Data Visualization Software
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
- Status: Free
Università Bocconi
Skills you'll gain: Project Finance, Risk Analysis, Capital Budgeting, Financial Analysis, Credit Risk, Risk Management, Investments, Loans, Contract Management, Banking
University of California San Diego
Skills you'll gain: Session Initiation Protocols, Version Control, Integrated Development Environments, Cloud Computing Architecture, GitHub, Cloud Computing, Software Design, Amazon Web Services, Software Design Documents, Cloud Infrastructure, Git (Version Control System), Computer Vision, System Design and Implementation, Android Development, Android Studio, Telecommunications, Internet Of Things, Wireless Networks, Mobile Development, Digital Communications
Adobe
Skills you'll gain: Color Theory, Typography, Color Matching, Graphic and Visual Design, Visual Design, Design, Graphic Design, Web Content Accessibility Guidelines, Design Elements And Principles, Logo Design, Creativity, Adobe Creative Cloud, Style Guides, User Experience Design, Content Creation
University of Colorado System
Skills you'll gain: Unity Engine, Debugging, Object Oriented Programming (OOP), Video Game Development, C# (Programming Language), Game Design, Software Design Patterns, Computer Programming, Event-Driven Programming, Data Structures, Integrated Development Environments, Data Storage, Application Development, Software Design, Program Development, UI Components, Cross Platform Development, Scripting, Data Import/Export, Development Environment
University of Minnesota
Skills you'll gain: Enterprise Resource Planning, Business Systems Analysis, Systems Analysis, Requirements Analysis, Cybersecurity, Business Requirements, Business Systems, Cloud Computing, Cloud Services, IT Management, Change Management, Information Technology, Organizational Change, Technology Strategies, Process Flow Diagrams, System Implementation, User Requirements Documents, Data Modeling, Enterprise Architecture, Portfolio Management
In summary, here are 10 of our most popular identifying and mitigating social engineering attacks courses
- Go and C++: Programming in Two Successor Languages of C: University of California, Santa Cruz
- Introduction to Household Water Treatment and Safe Storage: École Polytechnique Fédérale de Lausanne
- Introduction to CSS3: University of Michigan
- Get Started with Python: Google
- Banking and Financial Institutions: University of Illinois Urbana-Champaign
- Data Warehousing for Business Intelligence: University of Colorado System
- Real-Time Cyber Threat Detection and Mitigation: New York University
- Financing and Investing in Infrastructure: Università Bocconi
- Internet of Things and AI Cloud: University of California San Diego
- Design Fundamentals: Adobe