All Results

University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Security Controls, Geographic Information Systems, Geospatial Information and Technology, Encryption, Data Security, Network Security, Public Key Infrastructure, Cryptography, Web Applications, Wireless Networks

Illinois Tech
Skills you'll gain: Operating System Administration, Linux Administration, Microsoft Windows, Command-Line Interface, Operating Systems, System Configuration, Event Monitoring, Authorization (Computing), Desktop Support, OS Process Management, Network Security, Package and Software Management, Information Technology, IT Automation, Network Administration, General Networking, Software Installation

Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Digital Forensics, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Incident Management, Network Security, Authentications, Mobile Security, OSI Models, Security Controls, Configuration Management, Risk Analysis

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Identity and Access Management, Cloud Computing, User Provisioning, Security Controls, Cloud Management, Malware Protection, Cloud Infrastructure, Cloud Security, Security Engineering, Authorization (Computing), Network Security, Hardening, Cryptographic Protocols, Cybersecurity

Total Seminars
Skills you'll gain: Network Security, Virtual Private Networks (VPN), IT Security Architecture, Intrusion Detection and Prevention, Hardening, Network Monitoring, Firewall, Network Administration, Remote Access Systems, Network Architecture, Network Planning And Design, Zero Trust Network Access, Security Engineering, Security Controls, Security Management, Threat Detection, Security Information and Event Management (SIEM), Security Awareness, Encryption

Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Exploitation techniques, Brute-force attacks, Scripting, Network Protocols, Authentications, Scripting Languages, Python Programming, Data Access, Identity and Access Management, Automation
What brings you to Coursera today?

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies

LearnQuest
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Cloud Security, Disaster Recovery, Threat Management, Firewall, Security Management, Network Security, Cybersecurity, Cloud Services, AI Security, Network Monitoring, Cyber Security Policies, Cloud Management

Skills you'll gain: Risk Management Framework, Risk Analysis, Risk Management, Cybersecurity, Incident Management, Network Security, Incident Response, Cloud Security, Cyber Attacks, Authentications, Business Continuity Planning, Information Systems Security, Application Security, Security Management, Threat Modeling, OSI Models, Threat Management, Disaster Recovery, Cryptography, Vulnerability Assessments

John Wiley & Sons
Skills you'll gain: Incident Response, IT Security Architecture, DevSecOps, Vulnerability Scanning, Vulnerability Assessments, Cloud Security, Threat Management, Security Management, Computer Security Incident Management, Endpoint Security, Mobile Security, Security Strategy, Cloud Computing Architecture, Cyber Threat Intelligence, Cryptographic Protocols, Cybersecurity, Cyber Security Policies, Cyber Security Strategy, Cryptography, Risk Management

Skills you'll gain: Digital Forensics, Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Security Testing, Cryptography, Security Controls, Cryptographic Protocols, Cyber Security Assessment, Cybersecurity, Authorization (Computing), Cloud Computing, Malware Protection, Cyber Attacks, Data Integrity

Illinois Tech
Skills you'll gain: Operating System Administration, Microsoft Windows, Operating Systems, System Configuration, Firewall, Linux Administration, Linux, System Monitoring, File Systems, System Support, Event Monitoring, Authorization (Computing), File Management, Network Security, Data Security