• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Security Command Cente
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "security command cente"

    • Status: Preview
      Preview
      U

      Universiteit Leiden

      Population Health: Responsible Data Analysis

      Skills you'll gain: Statistical Inference, Statistical Hypothesis Testing, Regression Analysis, R Programming, Data Analysis, Descriptive Statistics, Epidemiology, Probability & Statistics, Data Ethics, Data Collection, Exploratory Data Analysis, Statistical Reporting, Statistical Modeling, Data Cleansing, Data Security

      4.6
      Rating, 4.6 out of 5 stars
      ·
      45 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      G

      Google Cloud

      Architecting with Google Compute Engine en Français

      Skills you'll gain: Identity and Access Management, Cloud Infrastructure, Prompt Engineering, Google Cloud Platform, Microservices, Infrastructure As A Service (IaaS), Cloud Platforms, Cloud Computing Architecture, Load Balancing, Kubernetes, Application Deployment, Cloud Computing, Cloud Applications, Generative AI, Cloud Services, Restful API, Large Language Modeling, Terraform, Site Reliability Engineering, Infrastructure Architecture

      4.6
      Rating, 4.6 out of 5 stars
      ·
      96 reviews

      Intermediate · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      B

      Board Infinity

      Advanced Cybersecurity Risk Management

      Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Risk Management, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cyber Threat Intelligence, Governance Risk Management and Compliance, Continuous Monitoring, Cyber Security Strategy, Security Information and Event Management (SIEM), Threat Detection, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Key Performance Indicators (KPIs)

      Intermediate · Course · 1 - 4 Weeks

    • Status: Preview
      Preview
      U

      Universidad de Palermo

      Historia de las Relaciones Internacionales

      Skills you'll gain: Diplomacy, International Relations, World History, European History, Political Sciences, Economics, Security Strategy

      5
      Rating, 5 out of 5 stars
      ·
      7 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Free Trial
      Free Trial
      J

      Johns Hopkins University

      Data and Electronic Health Records

      Skills you'll gain: Medical Privacy, Data Management, Data Integrity, Health Information Management, Data Quality, Health Informatics, Medical Records, Electronic Medical Record, Health Care, Patient Registration, Personally Identifiable Information, Data-Driven Decision-Making, Regulatory Compliance, Data Security, Information Privacy, Computerized Physician Order Entry, Care Coordination, Data Analysis

      4.3
      Rating, 4.3 out of 5 stars
      ·
      10 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      I

      IBM

      System Administration with IBM AIX: Getting Started

      Skills you'll gain: User Accounts, Unix, Systems Administration, File Systems, System Monitoring, System Configuration, Performance Tuning, Command-Line Interface, Data Storage

      Intermediate · Course · 1 - 3 Months

    • Status: Preview
      Preview
      N

      Northeastern University

      Innovation for Impact (i4i) The Carlson-Polizzotto Method of Value Creation

      Skills you'll gain: Value Propositions, Business Strategy, Business Modeling, Innovation, Customer Insights, Customer experience strategy (CX), Entrepreneurship, Market Opportunities, Continuous Improvement Process, Problem Solving, Critical Thinking

      4.8
      Rating, 4.8 out of 5 stars
      ·
      37 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: New
      New
      P

      Packt

      CyberSec First Responder (CFR-310)

      Skills you'll gain: Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Threat Modeling, Threat Detection, Intrusion Detection and Prevention, Application Security, Security Management, Network Security, Malware Protection, Network Analysis

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      I

      Intel

      Intel Telco Cloud Transformation

      Skills you'll gain: Digital Transformation, Network Infrastructure, Network Architecture, Operational Efficiency, Cloud Infrastructure, General Networking, Telecommunications, Cloud-Native Computing, Wireless Networks, Emerging Technologies, Network Security, Resource Utilization, Virtualization, Hardware Architecture, Scalability

      4.9
      Rating, 4.9 out of 5 stars
      ·
      8 reviews

      Beginner · Course · 1 - 4 Weeks

    • G

      Google Cloud

      Securing Cloud Applications with Identity Aware Proxy (IAP) using Zero-Trust

      Skills you'll gain: Google App Engine, Application Deployment, Zero Trust Network Access, Cloud Security, Google Cloud Platform, Cloud Applications, Identity and Access Management, Data Access, Network Security

      Intermediate · Project · Less Than 2 Hours

    • Status: Free Trial
      Free Trial
      P

      Packt

      Governance and Management of IT

      Skills you'll gain: IT Management, Control Objectives for Information and Related Technology (COBIT), Cloud Management, Risk Management Framework, Quality Assurance, Compliance Auditing, Technology Strategies, Governance, Quality Monitoring, Auditing, Information Technology Infrastructure Library, Risk Management, Business Priorities, Change Management, Resource Management, Internal Controls, Business Intelligence, Compliance Management, Capacity Management, Staff Management

      4.9
      Rating, 4.9 out of 5 stars
      ·
      10 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Preview
      Preview
      U

      University of Illinois Urbana-Champaign

      Blockchains, Tokens, and The Decentralized Future

      Skills you'll gain: Blockchain, Cryptography, FinTech, Governance, Emerging Technologies, Payment Systems, Transaction Processing, Distributed Computing, Digital Assets, Regulation and Legal Compliance, Internet Of Things, Data Security

      Build toward a degree

      4.7
      Rating, 4.7 out of 5 stars
      ·
      6 reviews

      Beginner · Course · 1 - 4 Weeks

    Searches related to security command cente

    analyzing findings with security command center
    security command center fundamentals
    getting started with security command center
    introdução ao security command center enterprise
    comienza a usar security command center enterprise
    detect and investigate threats with security command center
    memulai security command center enterprise
    開始使用 security command center enterprise
    1…170171172…236

    In summary, here are 10 of our most popular security command cente courses

    • Population Health: Responsible Data Analysis: Universiteit Leiden
    • Architecting with Google Compute Engine en Français: Google Cloud
    • Advanced Cybersecurity Risk Management: Board Infinity
    • Historia de las Relaciones Internacionales: Universidad de Palermo
    • Data and Electronic Health Records: Johns Hopkins University
    • System Administration with IBM AIX: Getting Started: IBM
    • Innovation for Impact (i4i) The Carlson-Polizzotto Method of Value Creation: Northeastern University
    • CyberSec First Responder (CFR-310): Packt
    • Intel Telco Cloud Transformation: Intel
    • Securing Cloud Applications with Identity Aware Proxy (IAP) using Zero-Trust: Google Cloud

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Do Not Sell/Share
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok