• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Analyzing Firewall Logs And Configuring Security Controls

Results for "analyzing firewall logs and configuring security controls"


  • Status: Free Trial
    Free Trial
    G

    Google

    Sound the Alarm: Detection and Response

    Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Incident Management, Security Management, Continuous Monitoring, Network Security, Network Monitoring, Splunk, Network Analysis, TCP/IP, Network Protocols, Query Languages

    4.8
    Rating, 4.8 out of 5 stars
    ·
    3.3K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    E

    EDUCBA

    Data Center Security Management with Microsoft System Center

    Skills you'll gain: Incident Response, Data Centers, DevSecOps, System Monitoring, Threat Detection, Infrastructure Security, Microsoft Servers, Security Management, Payment Card Industry (PCI) Data Security Standards, Information Systems Security, Windows Servers, IT Infrastructure, Security Information and Event Management (SIEM), Disaster Recovery, IT Automation, Virtual Machines, Configuration Management

    4.9
    Rating, 4.9 out of 5 stars
    ·
    54 reviews

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    I

    Infosec

    Network Traffic Analysis for Incident Response

    Skills you'll gain: Event Monitoring, OSI Models, Network Monitoring, Network Protocols, Cyber Threat Intelligence, Network Analysis, Network Troubleshooting, TCP/IP, Distributed Denial-Of-Service (DDoS) Attacks, Threat Detection, General Networking, Network Security, Incident Response, Command-Line Interface

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Cisco Learning and Certifications

    Network Security Principles

    Skills you'll gain: Network Security, Role-Based Access Control (RBAC), Cybersecurity, Firewall, Network Monitoring, Authentications, Virtual Private Networks (VPN), Computer Networking, Authorization (Computing), Intrusion Detection and Prevention, Identity and Access Management, Security Controls, General Networking, Encryption

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Packt

    The World of Computer Networking: Your CCNA starts here

    Skills you'll gain: Dynamic Host Configuration Protocol (DHCP), Routing Protocols, Network Routing, TCP/IP, Network Routers, Virtual Private Networks (VPN), OSI Models, Computer Networking, General Networking, Network Protocols, Networking Hardware, Network Switches, Network Troubleshooting, Local Area Networks, Network Performance Management, Network Infrastructure, Wireless Networks, Network Security, Network Model, Network Analysis

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Secure Networked System with Firewall and IDS

    Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Controls, Network Monitoring, Threat Detection, Linux Administration, Linux

    4
    Rating, 4 out of 5 stars
    ·
    60 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    G

    Google Cloud

    Security Command Center: Vulnerabilities/Misconfigurations

    Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Continuous Monitoring, Cloud Security, Threat Detection, Verification And Validation, Issue Tracking, Data Pipelines, Data Import/Export

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    CompTIA Linux+ XK0-005: Unit 7

    Skills you'll gain: Firewall, Linux Administration, Authorization (Computing), Linux Servers, Security Controls, Linux, Authentications, Network Security, Linux Commands, System Configuration, Servers, Server Administration, Encryption, Command-Line Interface

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google

    Connect and Protect: Networks and Network Security

    Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN), Encryption

    4.8
    Rating, 4.8 out of 5 stars
    ·
    7.1K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Packt

    Routing, Network Devices, and Security

    Skills you'll gain: Routing Protocols, Network Security, Network Routing, TCP/IP, Open Shortest Path First (OSPF), Network Protocols, Network Switches, Virtual Local Area Network (VLAN), Network Monitoring, Virtual Private Networks (VPN), Firewall, Network Infrastructure, Network Troubleshooting, Border Gateway Protocol, Network Performance Management, Virtual Networking, Network Analysis, Authentications, Encryption

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    C

    Cisco Learning and Certifications

    Data Security

    Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Cybersecurity, Network Security, Security Information and Event Management (SIEM), Network Monitoring, Information Assurance, Network Analysis, Intrusion Detection and Prevention, Event Monitoring, Continuous Monitoring, Threat Detection

    4.8
    Rating, 4.8 out of 5 stars
    ·
    63 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    CertNexus

    CFR: Security Assessment, Data Collection, and Log Analysis

    Skills you'll gain: Vulnerability Management, Security Information and Event Management (SIEM), Penetration Testing, Vulnerability Assessments, Cybersecurity, Intelligence Collection and Analysis, Vulnerability Scanning, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Analysis, Network Analysis, Auditing, Data Analysis, Linux Commands, Data Collection, Correlation Analysis, Bash (Scripting Language), Windows PowerShell

    Mixed · Course · 1 - 4 Weeks

1234…834

In summary, here are 10 of our most popular analyzing firewall logs and configuring security controls courses

  • Sound the Alarm: Detection and Response: Google
  • Data Center Security Management with Microsoft System Center: EDUCBA
  • Network Traffic Analysis for Incident Response: Infosec
  • Network Security Principles: Cisco Learning and Certifications
  • The World of Computer Networking: Your CCNA starts here: Packt
  • Secure Networked System with Firewall and IDS: University of Colorado System
  • Security Command Center: Vulnerabilities/Misconfigurations: Google Cloud
  • CompTIA Linux+ XK0-005: Unit 7: Pearson
  • Connect and Protect: Networks and Network Security: Google
  • Routing, Network Devices, and Security: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok