• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Zero Trust Security

More to explore:

Results for "zero trust security"


  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Analyze, Create, and Secure Data with Zero Trust

    Skills you'll gain: Investigation, NIST 800-53, Cyber Security Assessment, Personally Identifiable Information, Failure Analysis, Root Cause Analysis

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    P

    Pearson

    The Zero Trust Framework

    Skills you'll gain: Zero Trust Network Access, Cybersecurity, Vulnerability Assessments, Cyber Security Strategy, Cyber Security Assessment, IT Security Architecture, Network Security, Threat Modeling, Security Strategy, Security Controls, Cloud Security, Authentications, Identity and Access Management

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Building Trustworthy AI

    Skills you'll gain: AI Security, Responsible AI, Threat Modeling, DevSecOps, Governance Risk Management and Compliance, Compliance Management, Data Ethics, Data Governance, Model Evaluation, Reinforcement Learning, Risk Management, Prompt Engineering, Governance, Regulatory Compliance, Security Testing, MLOps (Machine Learning Operations), MITRE ATT&CK Framework, Continuous Monitoring, Ethical Standards And Conduct, Vulnerability Assessments

    3.4
    Rating, 3.4 out of 5 stars
    ·
    10 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Application Security for Developers and DevOps Professionals

    Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle

    4.7
    Rating, 4.7 out of 5 stars
    ·
    246 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    L

    LearnKartS

    CompTIA Security+ Certification Preparation

    Skills you'll gain: Computer Security Incident Management, Vulnerability Management, Cyber Governance, Threat Modeling, Incident Response, Network Security, Cyber Threat Intelligence, Malware Protection, Cyber Attacks, Governance Risk Management and Compliance, Hardening, Threat Detection, Security Strategy, Mobile Security, Business Risk Management, Cyber Security Policies, Vulnerability, Security Awareness, Vulnerability Assessments, Vulnerability Scanning

    4.6
    Rating, 4.6 out of 5 stars
    ·
    45 reviews

    Beginner · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Microsoft Azure Security Tools Specialization

    Skills you'll gain: Penetration Testing, Record Keeping, Security Testing, Data Management, Threat Management, Records Management, Cloud Computing Architecture, Authentications, Data Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, System Testing, Cyber Threat Intelligence, Authorization (Computing), Generative Adversarial Networks (GANs), Active Directory, Data Ethics, AI Security

    4.8
    Rating, 4.8 out of 5 stars
    ·
    49 reviews

    Beginner · Specialization · 3 - 6 Months

What brings you to Coursera today?

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Securing AI Data and Applications

    Skills you'll gain: AI Security, Threat Modeling, Role-Based Access Control (RBAC), Cloud Security, Data Governance, Secure Coding, Data Security, DevSecOps, Infrastructure as Code (IaC), Zero Trust Network Access, Application Security, Security Controls, Security Requirements Analysis, Data Quality, Cyber Security Policies, Security Engineering, Compliance Management, Identity and Access Management, Vulnerability Management

    Intermediate · Course · 3 - 6 Months

  • Status: New
    New
    G

    Google Cloud

    Security Command Center: Vulnerabilities/Misconfigurations

    Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Continuous Monitoring, Cloud Security, Threat Detection, Verification And Validation, Issue Tracking, Security Software, Data Pipelines, Data Import/Export

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Security of AI

    Skills you'll gain: AI Security, Responsible AI, Cyber Security Strategy, Cyber Attacks, Cyber Threat Intelligence, Cybersecurity, Data Security, DevSecOps, Security Engineering, Artificial Intelligence, Threat Modeling, Cyber Governance, Artificial Intelligence and Machine Learning (AI/ML), Risk Management, Encryption, Application Programming Interface (API), Machine Learning, Governance, Regulation and Legal Compliance, Applied Machine Learning

    4.5
    Rating, 4.5 out of 5 stars
    ·
    15 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    CompTIA CySA+ (CS0-003)

    Skills you'll gain: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, Cyber Governance, Intrusion Detection and Prevention, Risk Management Framework, Cyber Threat Intelligence, Network Infrastructure, Network Security, Security Information and Event Management (SIEM)

    4.6
    Rating, 4.6 out of 5 stars
    ·
    16 reviews

    Intermediate · Specialization · 1 - 4 Weeks

  • U

    University of Maryland, College Park

    Hardware Security

    Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Application Specific Integrated Circuits, Exploit development, Cryptography, Encryption, Exploitation techniques, Technical Design, Emerging Technologies, System Design and Implementation

    4.3
    Rating, 4.3 out of 5 stars
    ·
    693 reviews

    Mixed · Course · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    E

    EDUCBA

    Implementing Secure VCenter Clusters and VM Protection

    Skills you'll gain: vSphere Networking and Storage, Virtual Networking, VMware ESX Servers, vCenter Server, Virtual Machines, Virtualization, Infrastructure Security, Hardening, Role-Based Access Control (RBAC), Data Storage, Identity and Access Management, Windows PowerShell, Encryption, Computer Networking

    Beginner · Course · 1 - 4 Weeks

1234…298

In summary, here are 10 of our most popular zero trust security courses

  • Analyze, Create, and Secure Data with Zero Trust: Coursera
  • The Zero Trust Framework: Pearson
  • Building Trustworthy AI: Coursera
  • Application Security for Developers and DevOps Professionals: IBM
  • CompTIA Security+ Certification Preparation: LearnKartS
  • Microsoft Azure Security Tools Specialization: Microsoft
  • Securing AI Data and Applications: Coursera
  • Security Command Center: Vulnerabilities/Misconfigurations: Google Cloud
  • Cyber Security: Security of AI: Macquarie University
  • CompTIA CySA+ (CS0-003): Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok