• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Security Command Cente

Results for "security command cente"


  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Clinical Trials Data Management and Quality Assurance

    Skills you'll gain: Clinical Data Management, Data Quality, Quality Assurance, Data Entry, Clinical Trial Management Systems, Case Report Forms, Clinical Trials, Data Cleansing, Data Management, Data Integrity, Data Collection, Data Sharing, Data Security, Patient Treatment, Continuous Monitoring, Statistical Analysis

    4.8
    Rating, 4.8 out of 5 stars
    ·
    179 reviews

    Beginner · Course · 1 - 3 Months

  • G

    Google Cloud

    Creating a Virtual Machine

    Skills you'll gain: Virtual Machines, Web Servers, Google Cloud Platform, Cloud Deployment, Cloud Infrastructure, Virtual Networking, Command-Line Interface, Cloud Computing, Operating Systems

    4.6
    Rating, 4.6 out of 5 stars
    ·
    30 reviews

    Beginner · Project · Less Than 2 Hours

  • Status: Preview
    Preview
    R

    Red Hat

    Fundamentals of Containers, Kubernetes and OpenShift

    Skills you'll gain: OpenShift, Application Deployment, Kubernetes, Containerization, Cloud-Native Computing, Data Persistence, CI/CD, YAML, Configuration Management, Application Lifecycle Management, Package and Software Management, Command-Line Interface, Network Routing

    4.7
    Rating, 4.7 out of 5 stars
    ·
    48 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Classical Cryptosystems and Core Concepts

    Skills you'll gain: Cryptography, Cybersecurity, Encryption, Public Key Cryptography Standards (PKCS), Brute-force attacks, Data Integrity

    4.5
    Rating, 4.5 out of 5 stars
    ·
    425 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    I

    Illinois Tech

    Introduction to Contemporary Operating Systems and Hardware 1b

    Skills you'll gain: Networking Hardware, General Networking, Wireless Networks, Network Architecture, Computer Networking, Network Protocols, Local Area Networks, TCP/IP, Network Security, Network Routers, Network Switches, Wide Area Networks, System Configuration, Servers

    Build toward a degree

    4.5
    Rating, 4.5 out of 5 stars
    ·
    294 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    IBM

    Exploitation and Penetration Testing with Metasploit

    Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Information Systems Security, Data Persistence, Virtual Machines

    3.9
    Rating, 3.9 out of 5 stars
    ·
    17 reviews

    Intermediate · Course · 1 - 3 Months

  • I

    ISC2

    Risk Identification, Monitoring, and Analysis

    Skills you'll gain: Vulnerability Assessments, Risk Management, Continuous Monitoring, Operational Risk, Threat Management, Intrusion Detection and Prevention, Business Risk Management, Cyber Risk, Vulnerability Management, Security Controls, Enterprise Risk Management (ERM), Risk Mitigation, Risk Analysis, Compliance Management, Law, Regulation, and Compliance, Security Information and Event Management (SIEM), Technical Communication, Network Monitoring, Network Analysis

    4.7
    Rating, 4.7 out of 5 stars
    ·
    29 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Basic Cryptography and Programming with Crypto API

    Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Advanced Encryption Standard (AES), Application Security, Public Key Cryptography Standards (PKCS), Secure Coding, Data Security, Web Development, Email Security, PHP (Scripting Language), Brute-force attacks, Algorithms, User Provisioning

    4.5
    Rating, 4.5 out of 5 stars
    ·
    100 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    T

    Technical University of Munich (TUM)

    Urban Air Mobility

    Skills you'll gain: Traffic Flow Optimization, Transportation Operations, Demand Planning, Safety Standards, Aerospace Basic Quality System Standards, Sustainable Design, Sustainable Technologies, Environmental Issue, Feasibility Studies, User Acceptance Testing (UAT), Human Factors (Security), Emerging Technologies, Market Opportunities, Business Economics

    4.4
    Rating, 4.4 out of 5 stars
    ·
    90 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    INSEAD

    Introduction to Blockchain for Financial Services

    Skills you'll gain: Blockchain, FinTech, Cryptography, Design, Emerging Technologies, Stakeholder Analysis, Distributed Computing, Digital Assets, Data Integrity, Financial Services, Public Key Cryptography Standards (PKCS)

    4.7
    Rating, 4.7 out of 5 stars
    ·
    689 reviews

    Beginner · Course · 1 - 3 Months

  • G

    Google Cloud

    Getting started with Flutter Development

    Skills you'll gain: Flutter (Software), Cross Platform Development, Mobile Development, Cloud Development, Google Cloud Platform, User Interface (UI), Development Environment, Package and Software Management, Web Development, Network Security

    4.2
    Rating, 4.2 out of 5 stars
    ·
    178 reviews

    Beginner · Project · Less Than 2 Hours

  • Status: Preview
    Preview
    L

    LearnQuest

    Fundamentals of Kubernetes Deployment

    Skills you'll gain: Kubernetes, Application Deployment, Cloud Deployment, Containerization, Authentications, Authorization (Computing), Cloud-Native Computing, Cloud Infrastructure, Microservices, Infrastructure Architecture, Cloud Computing Architecture, Data Persistence, Software Architecture, Scalability, Command-Line Interface

    4.3
    Rating, 4.3 out of 5 stars
    ·
    323 reviews

    Intermediate · Course · 1 - 3 Months

Searches related to security command cente

security command center
1…9899100…290

In summary, here are 10 of our most popular security command cente courses

  • Clinical Trials Data Management and Quality Assurance: Johns Hopkins University
  • Creating a Virtual Machine: Google Cloud
  • Fundamentals of Containers, Kubernetes and OpenShift: Red Hat
  • Classical Cryptosystems and Core Concepts: University of Colorado System
  • Introduction to Contemporary Operating Systems and Hardware 1b: Illinois Tech
  • Exploitation and Penetration Testing with Metasploit: IBM
  • Risk Identification, Monitoring, and Analysis: ISC2
  • Basic Cryptography and Programming with Crypto API: University of Colorado System
  • Urban Air Mobility: Technical University of Munich (TUM)
  • Introduction to Blockchain for Financial Services: INSEAD

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok