• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • It Security Best Practices

Results for "it security best practices"


  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity and the X-Factor

    Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Human Factors (Security), Security Awareness, Cybersecurity, Computer Security Awareness Training, Cyber Risk, Cyber Attacks, Security Strategy, Employee Training, Insurance

    4.7
    Rating, 4.7 out of 5 stars
    ·
    260 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Dominant Risk Management Standards and Frameworks

    Skills you'll gain: Cost Benefit Analysis, Risk Management Framework, Risk Management, Risk Analysis, Cyber Risk, ISO/IEC 27001, Enterprise Risk Management (ERM), NIST 800-53, Business Risk Management, Risk Mitigation, Governance Risk Management and Compliance, Cybersecurity, Security Controls

    4.7
    Rating, 4.7 out of 5 stars
    ·
    42 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    K

    Kennesaw State University

    Cybersecurity and Its Ten Domains

    Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Business Continuity, Cryptography, Secure Coding, Systems Development Life Cycle, Security Controls, Law, Regulation, and Compliance, Infrastructure Security, Safety and Security, Identity and Access Management, Governance, Risk Management

    4.4
    Rating, 4.4 out of 5 stars
    ·
    2.4K reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity: Protecting your Information at Home

    Skills you'll gain: Email Security, Personally Identifiable Information, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption

    4.8
    Rating, 4.8 out of 5 stars
    ·
    35 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Cybersecurity for Business

    Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Exploit development, Cloud Security, Security Strategy, Computer Security Awareness Training, Risk Management, Enterprise Security

    4.7
    Rating, 4.7 out of 5 stars
    ·
    1.8K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    A General Approach to Risk Management

    Skills you'll gain: Risk Management, Risk Management Framework, Threat Management, Operational Risk, Enterprise Risk Management (ERM), Business Risk Management, Cyber Risk, Risk Mitigation, Risk Analysis, Governance Risk Management and Compliance, Vulnerability Assessments, Continuous Improvement Process

    4.9
    Rating, 4.9 out of 5 stars
    ·
    45 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google

    Sound the Alarm: Detection and Response

    Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols

    4.8
    Rating, 4.8 out of 5 stars
    ·
    3.3K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    L

    LearnKartS

    Ethical Hacking

    Skills you'll gain: Mobile Security, Cybersecurity, Penetration Testing, Cloud Security, Malware Protection, Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Security Testing, Cyber Security Assessment, Information Systems Security, Intrusion Detection and Prevention, Cyber Security Strategy, Threat Detection, Cyber Threat Intelligence, Cyber Threat Hunting, Security Controls, Security Awareness, Cyber Risk, Security Strategy

    4.7
    Rating, 4.7 out of 5 stars
    ·
    283 reviews

    Beginner · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity: What to Do When You Are a Victim

    Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Threat Detection, Information Privacy, Safety and Security, Multi-Factor Authentication

    5
    Rating, 5 out of 5 stars
    ·
    11 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity: Protecting your Information on the Go

    Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Computer Security Awareness Training, Personally Identifiable Information, Information Privacy, Emerging Technologies

    5
    Rating, 5 out of 5 stars
    ·
    8 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Google Workspace Administrator

    Skills you'll gain: User Provisioning, Data Governance, Google Workspace, Data Loss Prevention, Gmail, User Accounts, Google Gemini, Information Management, Email Security, Data Management, Data Security, Document Management, Identity and Access Management, Mobile Security, Records Management, Email Automation, Data Storage, Security Management, Cloud Security, Technical Support

    4.7
    Rating, 4.7 out of 5 stars
    ·
    1.5K reviews

    Beginner · Professional Certificate · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Incident Response and Digital Forensics

    Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity, Technical Communication

    4.7
    Rating, 4.7 out of 5 stars
    ·
    1.9K reviews

    Intermediate · Course · 1 - 4 Weeks

Searches related to it security best practices

design solutions with security best practices and priorities
1…585960…732

In summary, here are 10 of our most popular it security best practices courses

  • Cybersecurity and the X-Factor: Kennesaw State University
  • Dominant Risk Management Standards and Frameworks: Kennesaw State University
  • Cybersecurity and Its Ten Domains: Kennesaw State University
  • Cybersecurity: Protecting your Information at Home: Kennesaw State University
  • Cybersecurity for Business: University of Colorado System
  • A General Approach to Risk Management: Kennesaw State University
  • Sound the Alarm: Detection and Response: Google
  • Ethical Hacking: LearnKartS
  • Cybersecurity: What to Do When You Are a Victim: Kennesaw State University
  • Cybersecurity: Protecting your Information on the Go: Kennesaw State University

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok