More to explore:

All Results

  • Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Cyber Threat Intelligence, Exploitation techniques, Threat Management, Brute-force attacks, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Authentications, Network Protocols

  • Skills you'll gain: Cybersecurity, Network Security, Cyber Attacks, Penetration Testing, Cyber Security Assessment, Application Security, Cyber Security Strategy, Cyber Threat Intelligence, Vulnerability Scanning, Security Controls, Network Monitoring, Data Security, Cyber Risk

  • Skills you'll gain: Exploit development, Penetration Testing, Cyber Operations, Malware Protection, Exploitation techniques, Network Monitoring, Object Oriented Programming (OOP), Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting Languages, Scripting, Remote Access Systems, Python Programming, Program Development, Command-Line Interface, Code Reusability, Package and Software Management

  • Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Cyber Security Strategy, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, IT Security Architecture, Cyber Attacks, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management

  • New York University

    Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Cyber Security Assessment, Information Systems Security, Network Security, Computer Security, Exploitation techniques, Risk Management Framework, Cryptography, Data Integrity

  • Skills you'll gain: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, IT Security Architecture, Information Systems Security, Local Area Networks, Cyber Attacks, Computer Security, Linux Commands, Windows PowerShell, Security Controls, Hardening, Vulnerability Scanning, Endpoint Security, Threat Detection, Linux, Network Architecture, Wireless Networks, Network Analysis

What brings you to Coursera today?

  • Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Exploit development, Vulnerability Scanning, Exploitation techniques, Security Testing, Vulnerability Assessments, Hardening, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Computer Security Incident Management, Exploitation techniques

  • Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers

  • Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Malware Protection, Threat Detection, Penetration Testing, Threat Management, Cybersecurity, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security

  • Skills you'll gain: Metasploit, Penetration Testing, Network Security, Exploit development, Vulnerability Scanning, Security Testing, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Command-Line Interface, Linux Administration, Linux Commands, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration

  • Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness