• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Wi Fi Security

Results for "wi-fi security"


  • Status: Preview
    Preview
    C

    Campus BBVA

    Data & Cybersecurity

    Skills you'll gain: Incident Response, Security Information and Event Management (SIEM), Computer Security Incident Management, Data Security, Cybersecurity, Crisis Management, Cyber Threat Intelligence, Security Awareness, Email Security, Network Security, Data Science, Data Processing, Anomaly Detection, Malware Protection, Time Series Analysis and Forecasting, Authentications

    4.7
    Rating, 4.7 out of 5 stars
    ·
    325 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Cryptography and Information Theory

    Skills you'll gain: Cryptography, Encryption, Cybersecurity, Computer Security, Theoretical Computer Science, Information Architecture

    4.5
    Rating, 4.5 out of 5 stars
    ·
    544 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free
    Free
    C

    Coursera

    Vulnerability Scanning with Nmap: Network Scanning

    Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Network Security, Network Monitoring, Operating Systems

    4.6
    Rating, 4.6 out of 5 stars
    ·
    75 reviews

    Beginner · Guided Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    I

    ISC2

    Incident Response, BC, and DR Concepts

    Skills you'll gain: Incident Response, Business Continuity, Disaster Recovery, Cybersecurity, Security Management, Computer Security Incident Management, Crisis Management, Information Assurance

    4.7
    Rating, 4.7 out of 5 stars
    ·
    261 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University at Buffalo

    Digital Manufacturing & Design Technology

    Skills you'll gain: Model Based Systems Engineering, Peer Review, Systems Engineering, Product Lifecycle Management, Intrusion Detection and Prevention, Security Controls, Performance Measurement, Collaborative Software, Control Systems, Anomaly Detection, Machine Controls, Incident Response, Digital Transformation, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Manufacturing Operations, Supply Chain Management, Data Sharing, Manufacturing Processes

    4.6
    Rating, 4.6 out of 5 stars
    ·
    7K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Introduction to Applied Cryptography

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Key Management, Cybersecurity, Public Key Cryptography Standards (PKCS), Advanced Encryption Standard (AES), Encryption, Authentications, Arithmetic, Network Security, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science

    4.6
    Rating, 4.6 out of 5 stars
    ·
    1K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    P

    Packt

    AI & Cybersecurity Threats, Global Actors, and Trends

    Skills you'll gain: DevSecOps, Cyber Operations, Threat Modeling, AWS Identity and Access Management (IAM), Zero Trust Network Access, Encryption

    Intermediate · Course · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Architecting with Google Kubernetes Engine

    Skills you'll gain: Kubernetes, Google Cloud Platform, Cloud Infrastructure, Prompt Engineering, Containerization, Identity and Access Management, Cloud-Native Computing, CI/CD, Cloud Storage, Application Deployment, Cloud Management, Cloud Services, Virtual Machines, Scalability, Cloud Computing, Docker (Software), Application Development, Load Balancing, Generative AI Agents, Continuous Integration

    4.6
    Rating, 4.6 out of 5 stars
    ·
    5.2K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of Alberta

    Software Product Management

    Skills you'll gain: Agile Software Development, Project Risk Management, Requirements Analysis, Agile Methodology, Kanban Principles, Risk Management, Project Planning, Requirements Elicitation, Sprint Retrospectives, Requirements Management, Functional Requirement, Business Requirements, Sprint Planning, Software Development Methodologies, Software Development Life Cycle, Scrum (Software Development), Software Technical Review, Risk Management Framework, Product Management, Project Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    12K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Preview
    Preview
    C

    Campus BBVA

    Cybersecurity for Managers

    Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Attacks, Cybersecurity, Crisis Management, Security Awareness, Cyber Risk, Email Security, Data Security, Network Security, Business Process, Mobile Security, Information Privacy, Multi-Factor Authentication, Fraud detection

    4.7
    Rating, 4.7 out of 5 stars
    ·
    487 reviews

    Beginner · Course · 1 - 3 Months

  • I

    ISC2

    Incident Response and Recovery

    Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Security Management, Cybersecurity, Investigation, Continuous Monitoring, Threat Detection, Risk Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    47 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Cybersecurity Foundations

    Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Operating System Administration, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Cloud Services, Threat Management, General Networking, Windows PowerShell, Cyber Governance, Unix Commands

    4.7
    Rating, 4.7 out of 5 stars
    ·
    663 reviews

    Beginner · Specialization · 1 - 3 Months

1…565758…229

In summary, here are 10 of our most popular wi-fi security courses

  • Data & Cybersecurity: Campus BBVA
  • Cryptography and Information Theory: University of Colorado System
  • Vulnerability Scanning with Nmap: Network Scanning: Coursera
  • Incident Response, BC, and DR Concepts: ISC2
  • Digital Manufacturing & Design Technology: University at Buffalo
  • Introduction to Applied Cryptography: University of Colorado System
  • AI & Cybersecurity Threats, Global Actors, and Trends: Packt
  • Architecting with Google Kubernetes Engine: Google Cloud
  • Software Product Management: University of Alberta
  • Cybersecurity for Managers: Campus BBVA

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok