Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "keylogging techniques"
DeepLearning.AI
Skills you'll gain: Tensorflow, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Performance Tuning, Artificial Neural Networks, Machine Learning Algorithms, Analysis, Debugging
Skills you'll gain: Spreadsheet Software, Stakeholder Communications, Dashboard, Data-Driven Decision-Making, Data Analysis, Analytical Skills, Data Presentation, Business Analysis, Expectation Management, Quantitative Research, Communication
University of Michigan
Skills you'll gain: Pandas (Python Package), Jupyter, NumPy, Data Manipulation, Data Science, Data Structures, Data Analysis, Statistical Analysis, Pivot Tables And Charts, Data Cleansing, Data Import/Export, Probability & Statistics, Python Programming, Programming Principles
DeepLearning.AI
Skills you'll gain: Classification And Regression Tree (CART), Machine Learning Algorithms, Machine Learning, Applied Machine Learning, Data Ethics, Decision Tree Learning, Tensorflow, Artificial Intelligence, Supervised Learning, Deep Learning, Random Forest Algorithm, Artificial Neural Networks, Performance Tuning
Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN), Encryption
- Status: Free
Georgia Institute of Technology
Skills you'll gain: User Experience Design, Prototyping, User Centered Design, Usability, Requirements Analysis, UI/UX Research, Interaction Design, User Interface (UI) Design, Usability Testing, User Research
University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Human Factors, Information Privacy, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, User Centered Design, Design
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption
Arizona State University
Skills you'll gain: Learning Strategies, Enthusiasm, Motivational Skills, Learning Styles, Language Learning, Education Software and Technology, Stress Management, Communication Strategies, Self-Awareness, Cultural Diversity, General Networking
Skills you'll gain: Data Cleansing, Sampling (Statistics), Data Integrity, Data Quality, Data Validation, Sample Size Determination, Data Analysis, Data Manipulation, SQL, Data Transformation, Spreadsheet Software
University of California San Diego
Skills you'll gain: Algorithms, Program Development, Debugging, Development Testing, Test Engineering, Software Testing, Computational Thinking, Test Case, Computer Programming, Programming Principles, Data Structures, Theoretical Computer Science, Bioinformatics, Design Strategies
Skills you'll gain: Quality Management, Project Management Life Cycle, Project Closure, Project Management, Continuous Improvement Process, Project Controls, Quality Assessment, Team Management, Data-Driven Decision-Making, Project Documentation, Stakeholder Communications, Risk Management, Technical Communication, Meeting Facilitation
In summary, here are 10 of our most popular keylogging techniques courses
- Improving Deep Neural Networks: Hyperparameter Tuning, Regularization and Optimization: DeepLearning.AI
- Ask Questions to Make Data-Driven Decisions: Google
- Introduction to Data Science in Python: University of Michigan
- Advanced Learning Algorithms: DeepLearning.AI
- Connect and Protect: Networks and Network Security: Google
- Introduction to User Experience Design : Georgia Institute of Technology
- Usable Security: University of Maryland, College Park
- Assets, Threats, and Vulnerabilities: Google
- Teach English Now! Foundational Principles: Arizona State University
- Process Data from Dirty to Clean: Google