• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Network Security Protocols

Results for "network security protocols"


  • Status: New
    New
    P

    Packt

    The Absolute Beginners Guide to Cyber Security - Part 4

    Beginner · Course · 1 - 3 Months

  • G

    Google Cloud

    Cloud NGFW: Migrate VPC Firewall Rules that use Network Tags

    Skills you'll gain: Google Cloud Platform, Cloud Security, Network Security, Network Administration, Firewall, Virtual Networking, Data Migration

    Intermediate · Project · Less Than 2 Hours

  • Status: New
    New
    P

    Packt

    Cloud Security Essentials: AWS, Azure, GCP Protection

    Skills you'll gain: Cloud Security, Encryption, Network Security, Cloud Platforms, AI Security, Identity and Access Management, DevSecOps, Cloud Computing, Cloud Infrastructure, Infrastructure Security, Zero Trust Network Access, IT Security Architecture, Amazon S3, Data Security, Multi-Cloud, Data Storage, AWS Identity and Access Management (IAM), Microsoft Azure, Cloud Storage, Data Encryption Standard

    Beginner · Course · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Preparing for Your Professional Cloud Security Engineer Journey

    Skills you'll gain: Cloud Security, Data Loss Prevention, Security Engineering, Network Security, Continuous Monitoring, Identity and Access Management, Infrastructure Security, Data Security, Google Cloud Platform, Firewall, Payment Card Industry (PCI) Data Security Standards, CI/CD, Virtual Networking, Key Management, Encryption

    4.7
    Rating, 4.7 out of 5 stars
    ·
    149 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Cloud Security Risks: Identify and Protect Against Threats

    Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis

    4.3
    Rating, 4.3 out of 5 stars
    ·
    44 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    W

    Whizlabs

    Microsoft Copilot: Power Platform & Security Best Practices

    Skills you'll gain: Microsoft Copilot, Microsoft Power Automate/Flow, Microsoft Power Platform, Microsoft 365, AI Enablement, Threat Detection, Compliance Management, AI Security, Workflow Management, Automation, Incident Response

    4.2
    Rating, 4.2 out of 5 stars
    ·
    13 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Identity Access Management and Authentication

    Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Vulnerability Assessments, System Design and Implementation, Threat Detection, Cryptography, Risk Management, Remote Access Systems

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Incident Response - Theory to Practice

    Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Cyber Security Policies, Intrusion Detection and Prevention, Threat Detection, Disaster Recovery, Cybersecurity, Cyber Risk, Cyber Security Assessment, Crisis Management, Threat Management, Business Continuity, Safety and Security, Security Software, Strategic Communication, Regulation and Legal Compliance

    5
    Rating, 5 out of 5 stars
    ·
    6 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking Unix and Windows

    Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Cyber Security Assessment, Application Security, Unix, Vulnerability Assessments, Unix Shell, Computer Architecture, Unix Commands, Linux Commands, Scripting, Linux, Debugging, Authentications, File Management

    Build toward a degree

    Intermediate · Course · 1 - 3 Months

  • G

    Google Cloud

    Analyzing Findings with Security Command Center

    Skills you'll gain: Data Import/Export, Google Cloud Platform, Data Pipelines, Security Information and Event Management (SIEM), Data Sharing, Cloud Security

    Intermediate · Project · Less Than 2 Hours

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Essentials for Managers and Leaders

    Skills you'll gain: Cyber Governance, Law, Regulation, and Compliance, Security Strategy, Culture Transformation, Enterprise Security, Cyber Operations, Communication, Organizational Change, Strategic Communication, Performance Reporting, Business Risk Management, Business Leadership, Organizational Leadership, Leadership, Dashboard

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    CISSP Domain 6: Security Assessment and Testing

    Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, White-Box Testing, Threat Detection, Threat Modeling

    Advanced · Course · 1 - 4 Weeks

1…444546…480

In summary, here are 10 of our most popular network security protocols courses

  • The Absolute Beginners Guide to Cyber Security - Part 4: Packt
  • Cloud NGFW: Migrate VPC Firewall Rules that use Network Tags: Google Cloud
  • Cloud Security Essentials: AWS, Azure, GCP Protection: Packt
  • Preparing for Your Professional Cloud Security Engineer Journey: Google Cloud
  • Cloud Security Risks: Identify and Protect Against Threats: Google Cloud
  • Microsoft Copilot: Power Platform & Security Best Practices: Whizlabs
  • Cyber Security: Identity Access Management and Authentication: Macquarie University
  • Cyber Security: Incident Response - Theory to Practice: Macquarie University
  • Security & Ethical Hacking: Attacking Unix and Windows : University of Colorado Boulder
  • Analyzing Findings with Security Command Center: Google Cloud

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok