More to explore:

All Results

  • Skills you'll gain: Virtual Machines, Debugging, System Programming, Windows PowerShell, Virtual Environment, Virtualization, Programming Principles, Excel Macros, Linux

  • Skills you'll gain: Azure Active Directory, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Threat Modeling, Vulnerability Management, Zero Trust Network Access, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Security Information and Event Management (SIEM), Record Keeping, Authentications, Encryption, Penetration Testing, Secure Coding, Regulatory Requirements, Cloud Computing, Active Directory, Operating Systems, Cybersecurity, Computer Security Incident Management

  • Johns Hopkins University

    Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Fraud detection, Model Evaluation, Malware Protection, Cybersecurity, Threat Detection, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Classification Algorithms, Email Security, Network Security, Jupyter, Authentications, Machine Learning Methods, Machine Learning Algorithms, Artificial Intelligence

  • Skills you'll gain: Criminal Investigation and Forensics, Investigation, Cybersecurity, Data Security, Cyber Governance, Cyber Security Policies, Computer Security, Digital Assets, Security Testing, Data Analysis Software, Cyber Risk, Incident Management

  • Skills you'll gain: Endpoint Detection and Response, Threat Detection, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Modeling, Security Information and Event Management (SIEM), Cyber Security Strategy, Exploitation techniques, Cyber Operations, Cybersecurity, Malware Protection, Cyber Attacks, Data Security, System Implementation, Open Source Technology

  • Skills you'll gain: Exploit development, Penetration Testing, Cyber Operations, Malware Protection, Exploitation techniques, Network Monitoring, Object Oriented Programming (OOP), Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting Languages, Scripting, Remote Access Systems, Python Programming, Program Development, Command-Line Interface, Code Reusability, Package and Software Management

What brings you to Coursera today?

  • Skills you'll gain: Anomaly Detection, Malware Protection, Threat Detection, Network Analysis, AI Security, Cybersecurity, Model Evaluation, Network Security, Machine Learning Methods, Classification Algorithms, Microsoft Windows

  • Skills you'll gain: Event Monitoring, OSI Models, Network Monitoring, Network Protocols, Cyber Threat Intelligence, Network Analysis, TCP/IP, Distributed Denial-Of-Service (DDoS) Attacks, Threat Detection, General Networking, Network Security, Incident Response, Anomaly Detection, Command-Line Interface

  • Skills you'll gain: Cyber Threat Intelligence, Threat Modeling, MITRE ATT&CK Framework, Threat Detection, Threat Management, Intelligence Collection and Analysis, Report Writing, Technical Communication, Cyber Security Strategy, Cybersecurity, Research Reports, Data Storytelling, Oral Expression, Verbal Communication Skills, Incident Response, Risk Analysis, Communication, Infrastructure Security, Analysis, Stakeholder Communications

  • Skills you'll gain: Vulnerability Scanning, Metasploit, Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Network Security, Vulnerability Management, Brute-force attacks, Exploitation techniques, Network Monitoring, Network Troubleshooting, Security Engineering, Network Analysis, Wireless Networks, Network Protocols, Data Manipulation

  • Skills you'll gain: Email Security, Cybersecurity, Malware Protection, Network Security, Application Security, Information Systems Security, Cyber Security Strategy, Authentications, Data Security, Risk Management, Security Controls, Multi-Factor Authentication, Security Software, Threat Management, Risk Management Framework, Cryptography, Endpoint Security, Firewall, Threat Detection, Operating Systems

  • Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Security Strategy, IT Security Architecture, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cyber Security Assessment, Network Security, Application Security, DevSecOps, Malware Protection, Security Management, Cloud Security, Encryption, Authentications