• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Security Command Cente

Results for "security command cente"


  • Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Kubernetes - Security, and Large-Scale Deployments

    Skills you'll gain: Kubernetes, Google Cloud Platform, YAML, Cloud Deployment, Data Persistence, Containerization, Application Deployment, Configuration Management, MongoDB, Infrastructure Security, Network Security, Application Programming Interface (API), Scalability

    5
    Rating, 5 out of 5 stars
    ·
    6 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    P

    Packt

    The Absolute Beginners Guide to Cyber Security - Part 4

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Incident Response - Theory to Practice

    Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Cyber Security Policies, Intrusion Detection and Prevention, Threat Detection, Disaster Recovery, Cybersecurity, Cyber Risk, Cyber Security Assessment, Crisis Management, Threat Management, Business Continuity, Safety and Security, Security Software, Strategic Communication, Regulation and Legal Compliance

    5
    Rating, 5 out of 5 stars
    ·
    6 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free
    Free
    C

    Check Point Software Technologies Ltd.

    Check Point Jump Start: Harmony Endpoint Security

    Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Software, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Network Protocols, Software Installation, Linux

    4.7
    Rating, 4.7 out of 5 stars
    ·
    14 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking Unix and Windows

    Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Cyber Security Assessment, Application Security, Unix, Vulnerability Assessments, Unix Shell, Computer Architecture, Unix Commands, Linux Commands, Scripting, Linux, Debugging, Authentications, File Management

    Build toward a degree

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    P

    Packt

    Cyber Security Professional – Beginner’s Career Guide

    Skills you'll gain: Cyber Security Assessment, Penetration Testing, Cyber Threat Intelligence

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Preparing for Your Professional Cloud Security Engineer Journey

    Skills you'll gain: Cloud Security, Data Loss Prevention, Security Engineering, Network Security, Continuous Monitoring, Identity and Access Management, Infrastructure Security, Data Security, Google Cloud Platform, Firewall, Payment Card Industry (PCI) Data Security Standards, CI/CD, Virtual Networking, Key Management, Encryption

    4.7
    Rating, 4.7 out of 5 stars
    ·
    149 reviews

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Apple Platform Security, Integrations, & Management

    Skills you'll gain: Apple Service Certification, Application Lifecycle Management, Endpoint Security, Cloud Deployment, Performance Testing, System Configuration, Test Planning, Information Privacy

    Advanced · Course · 1 - 3 Months

  • P

    Packt

    AWS IAM: The Cloud Engineer's Security Handbook

    Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Role-Based Access Control (RBAC), Multi-Factor Authentication, Authorization (Computing), Security Controls, User Accounts, Key Management, Encryption, Command-Line Interface

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    W

    Whizlabs

    Microsoft Copilot: Power Platform & Security Best Practices

    Skills you'll gain: Microsoft Copilot, Microsoft Power Automate/Flow, Microsoft Power Platform, Microsoft 365, AI Enablement, Threat Detection, Compliance Management, AI Security, Workflow Management, Automation, Incident Response

    4.2
    Rating, 4.2 out of 5 stars
    ·
    13 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Identity Access Management and Authentication

    Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Vulnerability Assessments, System Design and Implementation, Threat Detection, Cryptography, Risk Management, Remote Access Systems

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    A

    AI CERTs

    Network and Security Optimization in Telecommunication

    Skills you'll gain: Real Time Data, Model Deployment, Anomaly Detection, Artificial Intelligence and Machine Learning (AI/ML), AI Security, Telecommunications, Tensorflow, Artificial Intelligence, Emerging Technologies, Network Performance Management, Generative AI, Generative AI Agents, Wireless Networks, Computer Networking, Network Architecture, Responsible AI, Digital Communications, Network Protocols, System Design and Implementation, Communication

    Intermediate · Course · 1 - 4 Weeks

Searches related to security command cente

security command center fundamentals
memulai security command center enterprise
security command center enterprise 시작하기
comienza a usar security command center enterprise
security command center: vulnerabilities/misconfigurations
analyzing findings with security command center
getting started with security command center
introdução ao security command center enterprise
1…363738…290

In summary, here are 10 of our most popular security command cente courses

  • Advanced Kubernetes - Security, and Large-Scale Deployments: Packt
  • The Absolute Beginners Guide to Cyber Security - Part 4: Packt
  • Cyber Security: Incident Response - Theory to Practice: Macquarie University
  • Check Point Jump Start: Harmony Endpoint Security: Check Point Software Technologies Ltd.
  • Security & Ethical Hacking: Attacking Unix and Windows : University of Colorado Boulder
  • Cyber Security Professional – Beginner’s Career Guide: Packt
  • Preparing for Your Professional Cloud Security Engineer Journey: Google Cloud
  • Advanced Apple Platform Security, Integrations, & Management: Packt
  • AWS IAM: The Cloud Engineer's Security Handbook: Packt
  • Microsoft Copilot: Power Platform & Security Best Practices: Whizlabs

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok