• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Analyzing Firewall Logs And Configuring Security Controls

Results for "analyzing firewall logs and configuring security controls"


  • I

    ISC2

    ISC2 Systems Security Certified Practitioner (SSCP)

    Skills you'll gain: Authentications, Incident Response, Cryptography, Security Controls, MITRE ATT&CK Framework, Malware Protection, Endpoint Security, Key Management, Authorization (Computing), Vulnerability Assessments, Telecommunications, Encryption, Threat Modeling, Risk Management, Application Security, Public Key Infrastructure, Asset Management, Cloud Security, OSI Models, Continuous Monitoring

    4.7
    Rating, 4.7 out of 5 stars
    ·
    286 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Security Best Practices in Google Cloud

    Skills you'll gain: Cloud Security, OAuth, Kubernetes, Security Controls, Google Cloud Platform, Identity and Access Management, Application Security, API Gateway, Cloud Storage, Authorization (Computing), Data Security, Hardening, Role-Based Access Control (RBAC), Key Management, Encryption

    4.7
    Rating, 4.7 out of 5 stars
    ·
    351 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    A

    Amazon Web Services

    AWS Security Governance at Scale

    Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Cloud Security, Amazon Web Services, Cloud Management, Cyber Governance, Security Controls, Amazon CloudWatch, Data Governance, Governance, Governance Risk Management and Compliance, Compliance Management, Multi-Tenant Cloud Environments, Continuous Monitoring, Risk Control, Account Management, Threat Detection, Automation, Configuration Management, Budget Management

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    L

    LearnQuest

    Managing Information System Security Architecture

    Skills you'll gain: Incident Response, IT Security Architecture, Identity and Access Management, Continuous Monitoring, Network Security, Security Awareness, Information Systems Security, Security Information and Event Management (SIEM), Application Security, Disaster Recovery, Security Controls, Cloud Security, Security Strategy, Threat Detection, Cyber Governance

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    U

    University of Pennsylvania

    Greek and Roman Mythology

    Skills you'll gain: Ancient History, Art History, Liberal Arts, Cultural Diversity, World History, Performing Arts, Anthropology, Sociology, Psychology

    4.8
    Rating, 4.8 out of 5 stars
    ·
    2.6K reviews

    Mixed · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    CISSP Domain 7: Security Operations

    Skills you'll gain: Contingency Planning, Business Continuity Planning, Computer Security Incident Management, Security Management, Incident Response, Disaster Recovery, Data Centers, Incident Management, Security Controls, Information Systems Security, Infrastructure Security, Configuration Management, Data Security, Change Control, Digital Forensics

    Advanced · Course · 1 - 4 Weeks

  • G

    Google Cloud

    Security Command Center Fundamentals

    Skills you'll gain: Cloud Security, System Configuration, Threat Detection, Security Information and Event Management (SIEM), Configuration Management, Google Cloud Platform, Security Management, Vulnerability Scanning, Continuous Monitoring, Vulnerability Management

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Palo Alto Networks

    Palo Alto Networks Network Security Fundamentals

    Skills you'll gain: Network Security, General Networking, TCP/IP, Cryptography, Endpoint Security, Firewall, Encryption, Network Infrastructure, Public Key Infrastructure, OSI Models, Zero Trust Network Access, Security Controls, Network Protocols, Network Analysis

    4.7
    Rating, 4.7 out of 5 stars
    ·
    213 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Microsoft Azure Security Tools Specialization

    Skills you'll gain: Penetration Testing, Record Keeping, Security Testing, Data Management, Records Management, Cloud Computing Architecture, Authentications, Data Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, System Testing, Cyber Threat Intelligence, Authorization (Computing), General Data Protection Regulation (GDPR), Generative Adversarial Networks (GANs), Active Directory, Data Ethics, AI Security

    4.8
    Rating, 4.8 out of 5 stars
    ·
    46 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    C

    Codio

    Software Security for Web Applications

    Skills you'll gain: Application Security, OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Server Side, Security Strategy

    4.9
    Rating, 4.9 out of 5 stars
    ·
    17 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    C

    Coursera

    Emerging Telecom Technologies: Edge Security Focus

    Skills you'll gain: Vulnerability Assessments, Network Security, Security Engineering, Telecommunications, Infrastructure Security, Cyber Security Assessment, Threat Detection, Network Analysis, Continuous Monitoring, Security Strategy, Internet Of Things, Emerging Technologies, General Networking, Network Architecture, Enterprise Architecture, Infrastructure Architecture, Virtualization

    Intermediate · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    U

    University of Pennsylvania

    English for Science, Technology, Engineering, and Mathematics

    Skills you'll gain: Research, English Language, Science and Research, Vocabulary, Literacy, Climate Change Adaptation, Sustainable Technologies, Grammar, Oral Comprehension, Environment, Environmental Science, Emerging Technologies

    4.8
    Rating, 4.8 out of 5 stars
    ·
    2.9K reviews

    Beginner · Course · 1 - 3 Months

1…414243…834

In summary, here are 10 of our most popular analyzing firewall logs and configuring security controls courses

  • ISC2 Systems Security Certified Practitioner (SSCP): ISC2
  • Security Best Practices in Google Cloud: Google Cloud
  • AWS Security Governance at Scale: Amazon Web Services
  • Managing Information System Security Architecture: LearnQuest
  • Greek and Roman Mythology: University of Pennsylvania
  • CISSP Domain 7: Security Operations: Infosec
  • Security Command Center Fundamentals: Google Cloud
  • Palo Alto Networks Network Security Fundamentals: Palo Alto Networks
  • Microsoft Azure Security Tools Specialization: Microsoft
  • Software Security for Web Applications: Codio

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok