![Securing Software, Data and End Points](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/0c/72257fe7db4b12a353c8fa1e78d4f2/EDU-SSCP-Coursera-Chapter-Securing_end_point_data-800x800-Tile-Blue.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Securing Software, Data and End Points
Available now
![Security Operations](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/41/2b47b47ae94b5bb032af5f889d7cb7/CC-D5-Badge_800x800.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Security Operations
Available now
![Incident Detection and Response](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/35/a440db6b27487d97d72cce78874fa1/EDU-SSCP-Coursera-Chapter-Incident_Detection_Response-800x800-Tile-Blue.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Incident Detection and Response
Available now
![Networks and Communications Security](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/56/f29160efeb11e7910e7b1165172d53/isc2-course5-icon.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Networks and Communications Security
Available now
![Systems and Application Security](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/c8/1ed2c0005a11e8835a6fa4b5e2f9d5/isc2-course6-icon.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Systems and Application Security
Available now
![Access Control Concepts](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/ea/9aca8c5e0940d1b6d54e417d8e100b/CC-D3-Badge_800x800.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Access Control Concepts
Available now
![Cloud and Wireless Security](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/de/b2a9d8ba6041a2aa6b241d01954a73/EDU-SSCP-Coursera-Chapter-Cloud_Wireless_Security-800x800-Tile-Blue.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Cloud and Wireless Security
Available now
![Security Principles](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/c0/e2ded9549643f7a480ce828a8340cf/CC-D1-Badge_800x800.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Security Principles
Available now
![ģ¬ģ“ė² ė³“ģ ģøģ ėģ“źø°](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/4e/e6e2f9f8c04875a5efacdaf3ce473b/Logo-800x800.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
ģ¬ģ“ė² ė³“ģ ģøģ ėģ“źø°
Available now
![Cryptography](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/f1/cb9940efe911e7b1cc597592a63de3/isc2-course4-icon.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Cryptography
Available now
![Access Controls](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/a5/1edfd0bb1911e793829174cf0765f4/isc2-course1-icon.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Access Controls
Available now
![Security Operations and Administration](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/64/a3c690efea11e7a4756998430cd323/isc2-course2-icon.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Security Operations and Administration
Available now
![Security Awareness Training](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/4e/e6e2f9f8c04875a5efacdaf3ce473b/Logo-800x800.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Security Awareness Training
Available now
![Maturing Risk Management](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/89/e648c6559b41f68b7eaa1f72cae96b/EDU-SSCP-Coursera-Chapter-Maturing_Risk_Management-800x800-Tile-Blue.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Maturing Risk Management
Available now
![Incident Response, BC, and DR Concepts](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/1d/2fb4455a6344a2ade50535159967b0/CC-D2-Badge_800x800.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Incident Response, BC, and DR Concepts
Available now
![Network Security](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/8c/34640457df4f3881f192a69bfb226a/CC-D4-Badge_800x800.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Network Security
Available now