• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Linked Lists Cybersecurity

Results for "linked lists cybersecurity"


  • P

    Packt

    IT & Cloud Audit Masterclass – Fundamentals to Advanced

    Skills you'll gain: Security Controls, IT General Controls (ITGC), Cloud Security, Cloud Computing, Cyber Security Assessment, Cybersecurity, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Risk Management Framework, Data Security, Identity and Access Management, Incident Response, Technical Communication

    Intermediate · Course · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    M2M & IoT Interface Design & Protocols for Embedded Systems

    Skills you'll gain: Internet Of Things, Cloud Computing Architecture, API Design, Amazon Web Services, Network Protocols, Embedded Software, Telecommunications, Middleware, Application Programming Interface (API), Application Security, Microservices, Cloud Services, Cloud Platforms, Cybersecurity, Wireless Networks

    Build toward a degree

    4.6
    Rating, 4.6 out of 5 stars
    ·
    124 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    D

    Databricks

    Introduction to Computational Statistics for Data Scientists

    Skills you'll gain: Bayesian Statistics, Databricks, Sampling (Statistics), Statistical Modeling, Probability, Classification And Regression Tree (CART), Jupyter, Regression Analysis, Statistical Programming, Predictive Modeling, Statistical Analysis, Probability Distribution, Data Science, Markov Model, Statistics, Simulations, Python Programming, Statistical Visualization, Mathematical Software, Statistical Inference

    4
    Rating, 4 out of 5 stars
    ·
    109 reviews

    Beginner · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Introduction to Ethical Hacking

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Cyber Operations, Security Testing, Vulnerability Scanning, Network Security, Operating Systems, Encryption

    3.8
    Rating, 3.8 out of 5 stars
    ·
    16 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Preview
    Preview
    Y

    Yale University

    South Asian Religions & Ecology

    Skills you'll gain: Environmental Issue, Sustainable Development, Environment and Resource Management, Cultural Sensitivity, Social Justice, Cultural Diversity, Ethical Standards And Conduct

    4.9
    Rating, 4.9 out of 5 stars
    ·
    30 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Credential Access, discovery, lateral movement & collection

    Skills you'll gain: MITRE ATT&CK Framework, Network Security, Cybersecurity, Exploitation techniques, Cyber Operations, Python Programming, Data Access, Authorization (Computing), Authentications, Scripting, Network Protocols, User Accounts

    4.7
    Rating, 4.7 out of 5 stars
    ·
    62 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    IBM

    Vector Databases: An Introduction with Chroma DB

    Skills you'll gain: Database Management Systems, NoSQL, Database Design, Databases, Database Architecture and Administration, Database Management, Generative AI, Data Architecture, AI Personalization, Large Language Modeling, Data Storage Technologies, Scalability

    4.6
    Rating, 4.6 out of 5 stars
    ·
    44 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    The Complete Ethical Hacking Course

    Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Cyber Attacks, Wireless Networks, Application Security, Network Monitoring, Linux, Object Oriented Programming (OOP), Vulnerability Assessments, Cyber Security Assessment, Intrusion Detection and Prevention

    4.7
    Rating, 4.7 out of 5 stars
    ·
    19 reviews

    Intermediate · Specialization · 3 - 6 Months

  • P

    Packt

    Pentesting Fundamentals for Beginners

    Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Virtual Machines, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Command-Line Interface, Software Installation

    5
    Rating, 5 out of 5 stars
    ·
    6 reviews

    Intermediate · Course · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Data, Privacy and AI Security

    Skills you'll gain: Responsible AI, Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Data Governance, Data Management, Cyber Security Strategy, Data Integrity, Data Loss Prevention, Cloud Security, Cybersecurity, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Security Management, Security Controls, Cyber Operations, Data Science

    4
    Rating, 4 out of 5 stars
    ·
    12 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    A

    Arizona State University

    Digital Safety and Security

    Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Information Systems Security, Security Strategy, Security Controls, Threat Modeling, Disaster Recovery, Data Loss Prevention, Incident Response, Vulnerability Assessments, Patch Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    64 reviews

    Mixed · Course · 1 - 3 Months

  • C

    Coursera

    Machine Learning with PySpark: Customer Churn Analysis

    Skills you'll gain: Exploratory Data Analysis, Feature Engineering, Data Analysis, PySpark, Data Processing, Data Cleansing, Data Transformation, Apache Spark, Data-Driven Decision-Making, Decision Tree Learning, Predictive Modeling, Predictive Analytics, Applied Machine Learning, Application Deployment, Machine Learning

    4.6
    Rating, 4.6 out of 5 stars
    ·
    25 reviews

    Intermediate · Guided Project · Less Than 2 Hours

1…495051…84

In summary, here are 10 of our most popular linked lists cybersecurity courses

  • IT & Cloud Audit Masterclass – Fundamentals to Advanced: Packt
  • M2M & IoT Interface Design & Protocols for Embedded Systems: University of Colorado Boulder
  • Introduction to Computational Statistics for Data Scientists: Databricks
  • Introduction to Ethical Hacking: Johns Hopkins University
  • South Asian Religions & Ecology: Yale University
  • Credential Access, discovery, lateral movement & collection: Infosec
  • Vector Databases: An Introduction with Chroma DB: IBM
  • The Complete Ethical Hacking Course: Packt
  • Pentesting Fundamentals for Beginners: Packt
  • Cyber Security: Data, Privacy and AI Security: Macquarie University

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok