All Results

Skills you'll gain: OSI Models, TCP/IP, Network Monitoring, Network Protocols, Network Troubleshooting, Network Security, Network Administration, Network Analysis, Cyber Security Assessment, Security Software, Linux

Skills you'll gain: Ansible, Puppet (Configuration Management Tool), Software-Defined Networking, Network Administration, Security Awareness, IT Automation, Chef (Configuration Management Tool), Virtual Private Networks (VPN), JSON, Network Engineering, Authentications, Computer Security Awareness Training, Network Infrastructure, Authorization (Computing), Identity and Access Management, Configuration Management, Cyber Security Policies, Remote Access Systems, Application Programming Interface (API)

Palo Alto Networks
Skills you'll gain: Zero Trust Network Access, Network Security, Endpoint Security, Network Administration, General Networking, TCP/IP, Cybersecurity, Network Infrastructure, Firewall, Security Controls, Cryptography, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Encryption, Authentications, Network Routing, Software As A Service

Skills you'll gain: Open Shortest Path First (OSPF), Virtual Local Area Network (VLAN), Wide Area Networks, Network Security, Routing Protocols, Threat Detection, Threat Management, Security Awareness, Network Administration, Multiprotocol Label Switching, Network Routing, Virtual Private Networks (VPN), Network Troubleshooting, Dynamic Host Configuration Protocol (DHCP), Network Switches, Local Area Networks, Network Protocols

Khalifa University
Skills you'll gain: Oral Comprehension, Vocabulary, Language Competency, Grammar, Language Learning, Language Interpretation, Translation, and Studies

Skills you'll gain: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, IT Security Architecture, Information Systems Security, Local Area Networks, Cyber Attacks, Computer Security, Linux Commands, Windows PowerShell, Security Controls, Hardening, Vulnerability Scanning, Endpoint Security, Threat Detection, Linux, Network Architecture, Wireless Networks, Network Analysis
What brings you to Coursera today?

Whizlabs
Skills you'll gain: Network Security, Virtual Private Networks (VPN), Microsoft Azure, Firewall, Network Engineering, Network Administration, Virtual Networking, Application Security, Remote Access Systems, Cloud Security, Identity and Access Management, Infrastructure Security, Web Applications, Load Balancing

Skills you'll gain: Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Vulnerability Assessments, Vulnerability Scanning, Security Testing

Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Cyber Attacks, Information Systems Security, Application Security, OSI Models, Cryptography, Data Security, Cryptographic Protocols, Encryption, Network Administration, Infrastructure Security, Endpoint Security, General Networking, Security Controls, Malware Protection, Cloud Computing, Wireless Networks, Network Protocols

Total Seminars
Skills you'll gain: Hardening, Endpoint Security, Endpoint Detection and Response, Intrusion Detection and Prevention, Network Security, Security Controls, Wireless Networks, Application Security, IT Security Architecture, Threat Detection, Authentications, Security Testing, Brute-force attacks, Cyber Attacks, Cryptographic Protocols, Security Management, Security Awareness, Security Strategy, System Configuration, Encryption

Skills you'll gain: Network Security, Virtual Private Networks (VPN), Authentications, Firewall, Authorization (Computing), Computer Security, Remote Access Systems, Cybersecurity, General Networking, Network Monitoring, Security Controls, IT Automation, Software-Defined Networking, Wireless Networks, Dynamic Host Configuration Protocol (DHCP), Virtual Local Area Network (VLAN), Automation, Network Routing, Encryption, Application Programming Interface (API)

Skills you'll gain: Network Security, Infrastructure Security, Ansible, Network Infrastructure, General Networking, IT Automation, Security Controls, Wireless Networks, Identity and Access Management, Cryptographic Protocols, Authorization (Computing), Scripting, Authentications, Automation, Scripting Languages, Encryption, Data Modeling