• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Analyzing Firewall Logs And Configuring Security Controls

Results for "analyzing firewall logs and configuring security controls"


  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Generative AI and LLM Security

    Skills you'll gain: AI Security, Responsible AI, Data Ethics, LLM Application, Generative AI, Google Gemini, Artificial Intelligence, Cloud Security, Governance Risk Management and Compliance, Cyber Security Strategy, Security Strategy, Artificial Intelligence and Machine Learning (AI/ML), Computer Security Awareness Training, Network Security, Security Management, Cyber Attacks, Cyber Security Policies, Natural Language Processing, Risk Management, Supply Chain

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Homeland Security and Cybersecurity Future

    Skills you'll gain: Cybersecurity, Cyber Security Strategy, Infrastructure Security, Cyber Attacks, Cyber Operations, Cyber Risk, Cyber Security Policies, Cyber Governance, Incident Response, Risk Management Framework, Technology Solutions, Legal Risk

    4.7
    Rating, 4.7 out of 5 stars
    ·
    161 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    IBM

    Operating Systems: Overview, Administration, and Security

    Skills you'll gain: Operating System Administration, Cloud Computing, Linux Commands, Linux Administration, Linux Servers, Cloud Security, Operating Systems, Windows PowerShell, Windows Servers, File Systems, System Software, Mac OS, Command-Line Interface, Active Directory, Computer Systems, Virtual Machines, Firewall, Virtualization, Containerization, User Accounts

    4.6
    Rating, 4.6 out of 5 stars
    ·
    5.7K reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    ISC2

    Security Operations

    Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    190 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Information Technology and Security Principles

    4.9
    Rating, 4.9 out of 5 stars
    ·
    18 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    E

    EDUCBA

    Security and Auditing in Ethereum

    Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Cyber Security Assessment, Payment Systems, Continuous Monitoring, Blockchain, Incident Response, Vulnerability Scanning, Code Review, Data Validation

    4.8
    Rating, 4.8 out of 5 stars
    ·
    30 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Introduction to Computers and Operating Systems and Security

    Skills you'll gain: Computer Systems, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Security Awareness, Computer Hardware, Information Systems Security, Computer Architecture, Data Storage, Patch Management, Cloud Computing

    4.8
    Rating, 4.8 out of 5 stars
    ·
    1.9K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Data & Identity Security

    Skills you'll gain: Cryptography, Identity and Access Management, Information Privacy, Encryption, Personally Identifiable Information, Data Security, Authentications, User Provisioning, Cybersecurity, Threat Modeling, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Vulnerability Assessments, Cyber Attacks, Computer Security, Cyber Security Strategy, Data Management, Security Management, Cyber Risk, Security Awareness

    4.3
    Rating, 4.3 out of 5 stars
    ·
    8 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: New
    New
    G

    Google Cloud

    Sécuriser des réseaux VPC - Cloud Next Generation Firewall

    Skills you'll gain: Firewall, Intrusion Detection and Prevention, Network Security, Infrastructure Security, Threat Detection, Cloud Security, Network Monitoring, Network Performance Management, Performance Tuning

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    ISC2

    Network Security

    Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption

    4.7
    Rating, 4.7 out of 5 stars
    ·
    247 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    W

    Whizlabs

    AWS: Security and Key Management

    Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Infrastructure Security, Data Security, Security Management, Vulnerability Management, Vulnerability Assessments, Key Management, Distributed Denial-Of-Service (DDoS) Attacks, Encryption

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Healthcare Data Security, Privacy, and Compliance

    Skills you'll gain: Medical Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management, Security Awareness, Personally Identifiable Information, Encryption, Health Care, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Medical Records, Information Privacy, Cloud Computing, Patient Safety

    4.8
    Rating, 4.8 out of 5 stars
    ·
    451 reviews

    Beginner · Course · 1 - 4 Weeks

1…192021…834

In summary, here are 10 of our most popular analyzing firewall logs and configuring security controls courses

  • Generative AI and LLM Security : Edureka
  • Homeland Security and Cybersecurity Future: University of Colorado System
  • Operating Systems: Overview, Administration, and Security: IBM
  • Security Operations: ISC2
  • Information Technology and Security Principles: Packt
  • Security and Auditing in Ethereum: EDUCBA
  • Introduction to Computers and Operating Systems and Security: Microsoft
  • Cyber Security: Data & Identity Security: Macquarie University
  • Sécuriser des réseaux VPC - Cloud Next Generation Firewall: Google Cloud
  • Network Security: ISC2

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok