Filter by
The language used throughout the course, in both instruction and assessments.
90 results for "data breach"
Skills you'll gain: Computer Security Incident Management, Cyberattacks
University of Colorado System
Skills you'll gain: Security Engineering, Network Security, System Security, Computer Security Incident Management, Cyberattacks, Software Security, Security Software, Computer Security Models, Computer Networking, Leadership and Management, Security Strategy, Risk Management, Software Testing, Cloud Computing, Operating Systems
Skills you'll gain: Security Engineering, Application Development, Software Engineering, Software Security, DevOps
- Status: Free
University of Michigan
Skills you'll gain: Decision Making, Critical Thinking, Data Analysis, Data Management, Regulations and Compliance, Social Media, Big Data, Experiment, General Statistics, Probability & Statistics
Imperial College London
University of Colorado System
Skills you'll gain: Computer Security Incident Management, Security Engineering, Software Security, System Security, Computer Security Models, Cyberattacks, Leadership and Management, Network Security, Risk Management, Security Strategy
Skills you'll gain: Computer Security Incident Management
Skills you'll gain: Network Security
University of Colorado System
Skills you'll gain: Cyberattacks, Network Security, Security Engineering, Software Security, Computer Networking, Computer Security Incident Management, System Security, Cloud Computing, Computer Security Models, Operating Systems
University of Colorado System
Skills you'll gain: Network Security, Security Engineering, System Security, Computer Security Models, Cryptography, Computer Security Incident Management, Cyberattacks, Leadership and Management, Risk Management, Software Security
University of Minnesota
Skills you'll gain: System Security, Cloud Computing, Data Management, Databases, Security Engineering
- Status: Free
Coursera Instructor Network
In summary, here are 10 of our most popular data breach courses
- Cybersecurity Capstone: Breach Response Case Studies:Â IBM
- Cybersecurity for Business:Â University of Colorado System
- Application Security for Developers and DevOps Professionals:Â IBM
- Data Science Ethics:Â University of Michigan
- Design and Implementation of Digital Health Interventions:Â Imperial College London
- Introduction to Cybersecurity for Business:Â University of Colorado System
- Incident Detection and Response:Â ISC2
- Cybersecurity Architecture:Â IBM
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Design and Analyze Secure Networked Systems:Â University of Colorado System