More to explore:

All Results

  • Skills you'll gain: Threat Modeling, Secure Coding, Application Security, DevSecOps, Open Web Application Security Project (OWASP), Cybersecurity, Security Testing, Mobile Security, Software Development Life Cycle, Cryptographic Protocols, Security Controls, Computer Security, Vulnerability Assessments, Continuous Monitoring, Vulnerability Management, Computer Programming, C and C++, Java Programming, Python Programming, C (Programming Language)

  • University at Buffalo

    Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Continuous Monitoring, Incident Response, Cyber Attacks, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Application Security, Computer Security Incident Management, Security Management, Cyber Security Strategy, Information Systems Security, Secure Coding, Cyber Security Policies, Cyber Security Assessment, Threat Management, Threat Detection, Information Assurance, Network Security

  • University of Colorado System

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

  • Skills you'll gain: Digital Forensics, Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Security Testing, Cryptography, Security Controls, Cryptographic Protocols, Cyber Security Assessment, Cybersecurity, Authorization (Computing), Cloud Computing, Malware Protection, Cyber Attacks, Data Integrity

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications

What brings you to Coursera today?

  • Skills you'll gain: Incident Response, Security Management, Computer Security Incident Management, Security Strategy, Cloud Security, Cryptographic Protocols, Cybersecurity, Cyber Governance, Cryptography, Public Key Infrastructure, Network Security, Digital Forensics, Risk Management

  • Skills you'll gain: Mobile Security, Digital Forensics, Criminal Investigation and Forensics, Cyber Threat Intelligence, Cyber Security Strategy, Investigation, Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Mobile Development, Cyber Security Policies, Model Training, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Data Security, Cyber Governance, Endpoint Security, Machine Learning Methods, iOS Development, Application Security

  • Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cryptography, Cyber Security Strategy, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cybersecurity, IT Security Architecture, Encryption, Information Systems Security, Vulnerability Assessments, Cyber Attacks, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management

  • Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Information Systems Security, Threat Modeling, Security Management, Computer Security Incident Management, Network Security, IT Security Architecture, Threat Management, Security Information and Event Management (SIEM), Cyber Threat Intelligence, Security Controls, Identity and Access Management, Cryptography, Threat Detection, Cyber Security Policies, Data Security, Computer Security, Risk Management

  • Skills you'll gain: Network Security, Virtual Private Networks (VPN), Authentications, Firewall, Authorization (Computing), Computer Security, Remote Access Systems, Cybersecurity, General Networking, Network Monitoring, Security Controls, IT Automation, Software-Defined Networking, Wireless Networks, Dynamic Host Configuration Protocol (DHCP), Virtual Local Area Network (VLAN), Automation, Network Routing, Encryption, Application Programming Interface (API)

  • Skills you'll gain: Computer Security Incident Management, Vulnerability Management, Cyber Security Strategy, Cyber Governance, Incident Response, Cyber Operations, Cyber Threat Intelligence, Encryption, Cyber Attacks, Governance Risk Management and Compliance, Incident Management, Cryptographic Protocols, Threat Detection, Security Strategy, Network Model, Mobile Security, Vulnerability, Security Awareness, Vulnerability Assessments, Vulnerability Scanning