Search result for Control systems Online Courses & Certifications
Get Course Alerts by Email
Bug Bounty - Web Application Penetration Testing Bootcamp
by We Secure © Training & Consultancy- 0.0
11 hours on-demand video
Penetration Testing these days is used as a common and favored process to analyze the security systems and programs of an organization. Penetration Testing comes in handy in corporate sectors and organizations, to fight against unlawful practices of breaching systems and to take precautionary actions against hackers. Gain full control over target machine using SQL injections....
$14.99
The Complete Class Of Accounts Payable Top 10 Payment Frauds
by Chris Benjamin, MBA & CFO- 3.8
2.5 hours on-demand video
Take control of your company! The time is now to put in place the proper processes and procedures to prevent fraud. In this course I also provide a download of an Accounts Payable Internal Control Assessment which you can use to evaluate your company and its risk exposure to fraud....
$12.99
Hacking and Patching
by Edward Chow- 3.9
Approx. 15 hours to complete
You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future exploitation. You will learn security in memory systems and virtual memory layout, and understand buffer overflow attacks and their defenses. Security in Memory Systems and Virtual Memory Layout...
Foundations of Computer Science
by Aspen Olmsted- 4.8
Approx. 16 hours to complete
Binary Number Systems Systems Software, Databases and Automation...
DevOps Tutorial: Complete Beginners Training - 5 in 1 Bundle
by Up Degree- 2.7
8.5 hours on-demand video
Its distributed architecture makes it more advantageous over other Version Control Systems (VCS) like SVN. The code is developed by the developers and its source code is managed by Version Control System tools like Git etc. Version control systems consist of a centrally shared repository where teammates can commit changes to a file or set of file....
$15.99
Website Hacking / Penetration Testing & Bug Bounty Hunting
by Zaid Sabih- 4.6
10 hours on-demand video
File upload - This vulnerability allow attackers to upload executable files on the target web server, exploiting these vulnerabilities properly gives you full control over the target website. etc, read/write files and even get a reverse shell access which gives you full control over the target server! Gain full control over target server using SQL injections....
$19.99
Deep Learning for Business
by Jong-Moon Chung- 4.4
Approx. 8 hours to complete
Deep Learning Computing Systems & Software...
Related searches
Mastering Ansible - From Beginner to Expert in Ansible
by James Spurin- 4.3
11 hours on-demand video
Designed for multi-tier deployments since day one, Ansible models your IT infrastructure by describing how all of your systems inter-relate, rather than just managing one system at a time. Correspondingly, there is a new version of the ubuntu-c system that is used as the Ansible control host....
$9.99
Master CMake for Cross-Platform C++ Project Building
by Milan Yadav- 4.5
3.5 hours on-demand video
Flow Control commands (If-else commands and the Loops) Using External Libraries developed using both CMake and Non-CMake based build systems...
$13.99
Learning Path: Android: Test-Driven Android App Development
by Packt Publishing- 4.2
10 hours on-demand video
Most of his high level classes include hands on experience with unit testing, scrum, and distributed version control systems....
$11.99