Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "smart contract vulnerabilities"
Skills you'll gain: Blockchain, Digital Assets, FinTech, Payment Systems, Digital Transformation, Emerging Technologies, Financial Systems, Identity and Access Management, Financial Services, Empowerment, Contract Management, Governance
Skills you'll gain: Digital Assets, Blockchain, Emerging Technologies, Business Transformation, E-Commerce, Business Modeling, Interoperability, Distributed Computing, Cryptography, Scalability, Governance
University of Michigan
Skills you'll gain: Negotiation, Contract Negotiation, Conflict Management, Communication, Contract Management, Influencing, Planning, Decision Making, Ethical Standards And Conduct, Industrial and Organizational Psychology
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
- Status: [object Object]
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
Emory University
Skills you'll gain: Data Cleansing, Presentations, Data Visualization, Consulting, Microsoft PowerPoint, Management Consulting, Executive Presence, Business Consulting, Benchmarking, Microsoft Excel, Proposal Writing, Storytelling, Data Storytelling, Proposal Development, Business Research, Interviewing Skills, Six Sigma Methodology, Analytical Skills, Professional Networking, Client Services
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
University at Buffalo
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Network Protocols, FinTech, Virtual Environment, Data Integrity, Emerging Technologies, Data Security, Data Validation
Skills you'll gain: Blockchain, Digital Assets, FinTech, Financial Systems, Emerging Technologies, Payment Systems, Business Transformation, Distributed Computing, Security Assertion Markup Language (SAML), Identity and Access Management, Innovation, Contract Management, Business Process Automation, Automation
- Status: Free
Università Bocconi
Skills you'll gain: Project Finance, Risk Analysis, Capital Budgeting, Financial Analysis, Investment Banking, Private Equity, Lending and Underwriting, Credit Risk, Risk Management, Investments, Finance, Loans, Contract Management, Financial Management, Banking
- Status: Free
École Polytechnique Fédérale de Lausanne
Skills you'll gain: Transportation Operations, Governance, Systems Thinking, Change Management, Emerging Technologies, Technology Strategies, Innovation, Infrastructure Architecture, Internet Of Things, Digital Transformation, Data Management, Stakeholder Management, Environmental Issue, Policy Analysis
In summary, here are 10 of our most popular smart contract vulnerabilities courses
- Transacting on the Blockchain:Â INSEAD
- Web3 and Blockchain Fundamentals:Â INSEAD
- Successful Negotiation: Essential Strategies and Skills:Â University of Michigan
- Identifying Security Vulnerabilities in C/C++Programming:Â University of California, Davis
- IBM Cybersecurity Analyst:Â IBM
- Microsoft Cybersecurity Analyst:Â Microsoft
- Management Consulting:Â Emory University
- IT Fundamentals for Cybersecurity:Â IBM
- Blockchain Basics:Â University at Buffalo
- Blockchain, Cryptoassets, and Decentralized Finance:Â INSEAD