Hacking

Sort options

Cybersecurity for Everyone (Coursera)

Cybersecurity affects everyone, including in the delivery of basic products and services. If you or your organization want to better understand how to address your cybersecurity, this is the course for you and your colleagues to take -- from seasoned professionals to your non-technical colleagues. Your instructor, Dr. Charles [...]
0
No votes yet

Technical deep dive with Incident Response tools (Coursera)

Oct 18th 2021
Technical deep dive with Incident Response tools (Coursera)
Course Auditing
Categories
Effort
Languages
The Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level, as well as allow them to build important technical skills through the hands-on labs and projects. This course starts with a high-level discussion of what happens at each phase [...]
0
No votes yet

Cybersecurity for Data Science (Coursera)

This course aims to help anyone interested in data science understand the cybersecurity risks and the tools/techniques that can be used to mitigate those risks. We will cover the distinctions between confidentiality, integrity, and availability, introduce learners to relevant cybersecurity tools and techniques including cryptographic tools, software resources, [...]
0
No votes yet

Hacking and Patching (Coursera)

In this MOOC, you will learn how to hack web apps with command injection vulnerabilities in a web site of your AWS Linux instance. You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future [...]
1
Average: 1 ( 4 votes )

Innovative Finance: Hacking finance to change the world (Coursera)

To address global poverty - do we really not have enough resources or do we not have the right tools to allocate our resources? The tools of finance, when applied correctly, can be an enabler of social and environmental outcomes. This course is designed to give you the ability [...]
8
Average: 8 ( 4 votes )

Hacking PostgreSQL: Data Access Methods (edX)

Learn the science, engineering practices and hacking techniques of data access – core aspects of information processing in a database. This course is about data storage and data processing technologies with examples from PostgreSQL. It is geared toward database core developers, operation systems developers, system architects, and all those [...]
10
Average: 10 ( 3 votes )

Be A White Hat Hacker and Pen Tester (Eduonix)

Learn how to become a certified White Hat Hacker & earn an official online White Hat Hacking Certification in this Course. Become a white hat hacker and learn all the practical techniques for penetration testing with this amazing course which will provide conceptual framework to your security training. The [...]
0
No votes yet

Penetration Testing and Ethical Hacking (Cybrary)

Self Paced
Penetration Testing and Ethical Hacking (Cybrary)
Free Course
Categories
Effort
Languages
As the amount of cyber threats continue to grow, so does the Cyber Security industry. The need for capable ethical hackers is a global need. Ethical hackers are “white-hat” hackers (aka the good guys) that penetrate secured systems to highlight flaws and weaknesses in a system. They help government [...]
10
Average: 10 ( 2 votes )

Computer and Hacking Forensics (Cybrary)

Self Paced
Computer and Hacking Forensics (Cybrary)
Free Course
Categories
Effort
Languages
Digital crime is more prevalent than ever, and the attacks are getting highly complex. Security software can’t pinpoint it—the eyes and expertise of a trained professional is necessary. Our free Computer and Hacking Forensics training teaches you how to become that professional.
4
Average: 4 ( 2 votes )

Post-Exploitation Hacking (Cybrary)

Self Paced
Post-Exploitation Hacking (Cybrary)
Free Course
Categories
Effort
Languages
As the name implies, Post Exploitation Hacking – Persistence and Continued Access, refers to the series of steps to be followed after breaking into a system. Offensive hacking to accomplish an objective requires ultimate stealth—but unfortunately many hackers (both script-kiddies and experienced professionals) sometimes fail to perform acts that conceal [...]
7
Average: 7 ( 2 votes )