More to explore:

All Results

  • Skills you'll gain: Microsoft Power Automate/Flow, Microsoft Power Platform, Email Automation, Document Management, Microsoft 365, Invoicing, Collaborative Software, Automation, User Accounts

  • Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Endpoint Security, Microsoft Windows, Authentications, Application Deployment, Operating System Administration, Cyber Security Policies, Azure Active Directory, Group Policy, Enterprise Application Management, Identity and Access Management, Cloud Applications, Enterprise Security, Mobile Security, Endpoint Detection and Response, System Configuration, Security Management, User Provisioning, Android (Operating System), Patch Management

  • Skills you'll gain: Service Management, Service Improvement, Quality Improvement, Service Design, IT Service Management, Customer experience improvement, Self Service Technologies, Call Center Experience, Customer Service, IT Management, Customer experience strategy (CX), Intranet, Systems Integration, Operations, Account Management, Virtual Environment

  • Skills you'll gain: C# (Programming Language), Restful API, ASP.NET, Model View Controller, .NET Framework, Docker (Software), Azure DevOps, Object Oriented Programming (OOP), Azure DevOps Pipelines, Microservices, Containerization, JSON, Application Programming Interface (API), API Design, DevOps, Web Services, Middleware, CI/CD, Object Oriented Design, Application Frameworks

  • Skills you'll gain: Network Security, Virtual Private Networks (VPN), Authentications, Firewall, Authorization (Computing), Computer Security, Remote Access Systems, Cybersecurity, General Networking, Network Monitoring, Security Controls, IT Automation, Software-Defined Networking, Wireless Networks, Dynamic Host Configuration Protocol (DHCP), Virtual Local Area Network (VLAN), Automation, Network Routing, Encryption, Application Programming Interface (API)

What brings you to Coursera today?

  • Skills you'll gain: OSI Models, Computer Networking, Virtual Local Area Network (VLAN), Network Administration, Network Architecture, Network Infrastructure, Network Troubleshooting, General Networking, Wide Area Networks, Network Planning And Design, Local Area Networks, Cloud Computing, TCP/IP, Network Security, Threat Detection, Cloud Services, Network Protocols, Intrusion Detection and Prevention, Networking Hardware, Computer Security

  • University of California, Irvine

    Skills you'll gain: Network Security, Computer Hardware, Hardware Architecture, Computer Systems, TCP/IP, Information Technology, Networking Hardware, System Software, General Networking, OSI Models, Computer Literacy, Network Protocols, Operating Systems, System Configuration, Software Installation, Security Software, Computer Networking, Software Systems, Intranet, Data Storage

  • Skills you'll gain: Virtual Private Networks (VPN), Wide Area Networks, Telecommunications, Networking Hardware, System Configuration, System Implementation

  • Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, Scalability, Data Access, Security Controls, User Provisioning, Security Management, Collaborative Software, Content Management, Data Security, Data Management, Data Governance, Verification And Validation

  • Skills you'll gain: File Management, Remote Access Systems, Public Key Infrastructure, Software-Defined Networking, Microsoft Windows, Windows Servers, Network Troubleshooting, Microsoft Servers, Virtual Private Networks (VPN), Hardening, Computer Networking, Virtual Networking, Key Management, Active Directory, Firewall, File Transfer Protocol (FTP), Network Administration, Server Administration, Systems Administration, Administration

  • Birla Institute of Technology & Science, Pilani

    Skills you'll gain: Encryption, Information Systems Security, Threat Modeling, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Threat Management, Application Security, Data Security, Computer Security, Security Management, Network Security, Incident Response, Data Encryption Standard, Cyber Security Policies, Cryptography, Intrusion Detection and Prevention, Security Controls, Data Integrity, Authentications