• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Security Policy

Results for "security policy"


  • Status: New
    New
    P

    Packt

    Bug Bounty from Scratch

    Skills you'll gain: Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Penetration Testing, Threat Modeling, Exploit development, Open Web Application Security Project (OWASP), Application Security, Cyber Security Assessment, Patch Management, Cybersecurity, Data Ethics, Cyber Engineering, Technical Communication, Technical Writing

    Beginner · Course · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Cybersecurity in modern organizations

    Skills you'll gain: Cybersecurity, Network Protocols, Threat Management, Threat Modeling, Security Controls, Responsible AI, Cyber Attacks, Secure Coding, Cyber Security Policies, Data Security, Security Awareness, Computer Security Awareness Training, Agile Methodology, Cyber Risk, Cyber Threat Intelligence, Network Security, TCP/IP, Incident Response, Threat Detection, Risk Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    1.1K reviews

    Intermediate · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google

    Conduct UX Research and Test Early Concepts

    Skills you'll gain: UI/UX Research, Usability Testing, Presentations, User Experience Design, User Research, Mobile Development, Data Ethics, User Centered Design, Research Design, Prototyping, Wireframing, Interviewing Skills, Information Privacy

    4.8
    Rating, 4.8 out of 5 stars
    ·
    6K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Govern Your GenAI Data Safely

    Skills you'll gain: Data Governance, Role-Based Access Control (RBAC), Responsible AI, Governance, Data Management, Generative AI, Metadata Management, Security Controls, AI Security, Data Quality, Data Access, Identity and Access Management, Benchmarking, Data Security, Compliance Management, Quality Assurance and Control

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Managing Cybersecurity Incidents and Disasters

    Skills you'll gain: Incident Response, Contingency Planning, Disaster Recovery, Computer Security Incident Management, Security Management, Crisis Management, Cybersecurity, Business Continuity, Cyber Attacks, Risk Analysis, Business Risk Management, Data Management

    4.8
    Rating, 4.8 out of 5 stars
    ·
    251 reviews

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Cisco Learning and Certifications

    Network Management Approaches

    Skills you'll gain: Network Performance Management, Network Monitoring, Network Administration, Network Troubleshooting, Network Security, Computer Networking, Network Infrastructure, System Monitoring, Command-Line Interface, Software-Defined Networking, Application Programming Interface (API), System Configuration, Network Protocols

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    A

    AI CERTs

    Responsible AI Principles

    Skills you'll gain: Responsible AI, AI Security, Data Ethics, Governance, Data Governance, Law, Regulation, and Compliance, Ethical Standards And Conduct, Compliance Training, Artificial Intelligence, Business Ethics, Compliance Management, Accountability, Regulatory Requirements, Governance Risk Management and Compliance, General Data Protection Regulation (GDPR), Personally Identifiable Information, Information Privacy, Stakeholder Engagement

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    E

    EC-Council

    Cybersecurity Attack and Defense Fundamentals

    Skills you'll gain: Digital Forensics, Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Malware Protection, Authentications, Identity and Access Management, Cyber Attacks, Threat Detection, Data Integrity

    4.6
    Rating, 4.6 out of 5 stars
    ·
    793 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Preview
    Preview
    C

    Coursera

    AppDynamics: From Basics to Performance Mastery

    Skills you'll gain: Role-Based Access Control (RBAC), Application Performance Management, System Monitoring, Performance Tuning, Devops Tools, Site Reliability Engineering, Continuous Monitoring, Application Deployment, Transact-SQL, Transaction Processing, Enterprise Application Management, Incident Management, Anomaly Detection, Microservices, Performance Analysis, Containerization, Email Automation, Real Time Data, Analysis, Health Policy

    Advanced · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Strategic AI Governance

    Skills you'll gain: Responsible AI, Threat Modeling, MLOps (Machine Learning Operations), Security Testing, Secure Coding, Cost Management, Data Ethics, Data Governance, Experimentation, Prompt Engineering, Application Security, CI/CD, Automation, Financial Forecasting, Compliance Management, Governance, Technical Documentation, Vulnerability Assessments, Risk Management, Stakeholder Communications

    Intermediate · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    CertNexus

    CyberSec First Responder – Advanced (CFR-A): Analyze

    Skills you'll gain: Incident Response, Continuous Monitoring, Cybersecurity, Cyber Security Assessment, Cyber Attacks, Event Monitoring, Data Security, Vulnerability, System Monitoring, Analysis, Network Security, Network Monitoring, Criminal Investigation and Forensics, Linux Commands, System Configuration, Bash (Scripting Language), Python Programming, Scripting, Linux, Scripting Languages

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Cybersecurity for Business

    Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Computer Security Awareness Training, Risk Management, Security Awareness, Enterprise Security

    4.7
    Rating, 4.7 out of 5 stars
    ·
    1.8K reviews

    Beginner · Specialization · 3 - 6 Months

1…596061…327

In summary, here are 10 of our most popular security policy courses

  • Bug Bounty from Scratch: Packt
  • Cybersecurity in modern organizations: Coursera
  • Conduct UX Research and Test Early Concepts: Google
  • Govern Your GenAI Data Safely: Coursera
  • Managing Cybersecurity Incidents and Disasters: Kennesaw State University
  • Network Management Approaches: Cisco Learning and Certifications
  • Responsible AI Principles: AI CERTs
  • Cybersecurity Attack and Defense Fundamentals: EC-Council
  • AppDynamics: From Basics to Performance Mastery: Coursera
  • Strategic AI Governance: Coursera

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok