• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Security Policies

Results for "security+policies"


  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Linux Server Management and Security

    Skills you'll gain: Linux Administration, Linux, Linux Servers, Operating System Administration, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Authorization (Computing), Computer Security, Network Administration, Authentications

    4.6
    Rating, 4.6 out of 5 stars
    ·
    917 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    L

    LearnKartS

    System & Network Security Essentials

    Skills you'll gain: Malware Protection, Network Security, Cybersecurity, Cyber Attacks, Information Systems Security, Intrusion Detection and Prevention, Penetration Testing, Firewall, Hardening, Threat Detection, Brute-force attacks, Internet Of Things, Network Protocols, Network Analysis

    4.8
    Rating, 4.8 out of 5 stars
    ·
    49 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    C

    Codio

    Tools for Security Specialists

    Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Digital Forensics, Risk Management, Personally Identifiable Information, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Enterprise Risk Management (ERM), Business Risk Management, Security Information and Event Management (SIEM), Security Strategy

    4.7
    Rating, 4.7 out of 5 stars
    ·
    66 reviews

    Beginner · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    C

    Codio

    Software Security for Web Applications

    Skills you'll gain: Application Security, OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Server Side, Security Strategy

    4.9
    Rating, 4.9 out of 5 stars
    ·
    17 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    I

    Illinois Tech

    Cyber Security Technologies

    Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance

    Build toward a degree

    4.6
    Rating, 4.6 out of 5 stars
    ·
    22 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Security and Authentication

    Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Microsoft Copilot, Data Security, Back-End Web Development, Authorization (Computing), JSON, Identity and Access Management, Data Storage, Application Programming Interface (API), Encryption

    4.7
    Rating, 4.7 out of 5 stars
    ·
    9 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    CompTIA Linux+ XK0-005: Unit 7

    Skills you'll gain: Firewall, Linux Administration, Authorization (Computing), Linux Servers, Linux, Security Controls, Authentications, Network Security, Linux Commands, System Configuration, Servers, Server Administration, Encryption, Command-Line Interface

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Essentials for Workplace

    Skills you'll gain: Human Factors (Security), Security Awareness, Cyber Security Strategy, Cyber Governance, Data Ethics, User Experience Design, Cyber Security Policies, Cyber Security Assessment, Cyber Attacks, Cyber Risk, Security Management, Cybersecurity, Security Strategy, Culture Transformation, Cyber Threat Intelligence, Cyber Threat Hunting, Data Security, Network Security, Cloud Security, Mobile Security

    4.8
    Rating, 4.8 out of 5 stars
    ·
    6 reviews

    Beginner · Course · 1 - 3 Months

  • I

    ISC2

    Security Concepts and Practices

    Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Configuration Management, Data Ethics, Data Integrity, Identity and Access Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    106 reviews

    Beginner · Course · 1 - 4 Weeks

  • I

    ISC2

    Systems and Application Security

    Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Deployment, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Encryption

    4.7
    Rating, 4.7 out of 5 stars
    ·
    30 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Identity and Access Management (IAM)

    Skills you'll gain: Identity and Access Management, Authentications, AWS Identity and Access Management (IAM), User Provisioning, OAuth, User Accounts, Security Controls, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Cryptographic Protocols

    4.7
    Rating, 4.7 out of 5 stars
    ·
    20 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Irvine

    Security Governance & Compliance

    Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security

    4.7
    Rating, 4.7 out of 5 stars
    ·
    175 reviews

    Mixed · Course · 1 - 4 Weeks

1…456…9

In summary, here are 10 of our most popular security+policies courses

  • Linux Server Management and Security: University of Colorado System
  • System & Network Security Essentials: LearnKartS
  • Tools for Security Specialists: Codio
  • Software Security for Web Applications: Codio
  • Cyber Security Technologies: Illinois Tech
  • Security and Authentication: Microsoft
  • CompTIA Linux+ XK0-005: Unit 7: Pearson
  • Cyber Security: Essentials for Workplace: Macquarie University
  • Security Concepts and Practices: ISC2
  • Systems and Application Security: ISC2

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok