All Results

Skills you'll gain: IT Security Architecture, Information Systems Security, Systems Architecture, Zero Trust Network Access, Risk Management Framework, Application Security, Computer Security, Cybersecurity, Security Management, Network Security, Security Strategy, Information Assurance, Data Security, Cyber Security Assessment, Cyber Risk, Enterprise Architecture, Data Integrity

EC-Council
Skills you'll gain: Cryptography, Encryption, Systems Development Life Cycle, Human Factors (Security), Threat Management, Systems Development, Security Management, Information Assurance, Cryptographic Protocols, Security Awareness, Cybersecurity, Cyber Attacks, Computer Security Awareness Training, Cyber Security Policies, Threat Detection, ISO/IEC 27001, Data Security, Security Controls, Cyber Threat Intelligence, Network Security

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Incident Management, Penetration Testing, Cybersecurity, Authentications, Cyber Attacks, Security Controls, Vulnerability Assessments, Encryption, Firewall, Threat Management, User Accounts, Identity and Access Management, Mobile Security, Risk Management

Skills you'll gain: Threat Modeling, Threat Management, MITRE ATT&CK Framework, Cybersecurity, Security Controls, Security Strategy, Risk Management Framework, Open Web Application Security Project (OWASP), Software Development Life Cycle, Cloud Security

Skills you'll gain: IT Management, Information Technology Architecture, Computer Security Awareness Training, Computer Security, Human Factors (Security), Artificial Intelligence

John Wiley & Sons
Skills you'll gain: Security Management, Risk Management, Risk Management Framework, Compliance Management, Enterprise Risk Management (ERM), Risk Control, Security Strategy, Cyber Governance, Risk Analysis, Governance, Cybersecurity, Regulatory Compliance, Security Controls, Law, Regulation, and Compliance, Regulation and Legal Compliance, Management Reporting, Cyber Security Policies, Cyber Security Strategy, Performance Reporting, Incident Response
What brings you to Coursera today?

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Data Validation

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Cryptography, Cryptographic Protocols, Key Management, Security Engineering, Threat Modeling, Security Management, Authorization (Computing), Encryption, Email Security, Data Integrity, Authentications

Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security, Computer Security Awareness Training, Cyber Security Strategy, Security Awareness, Threat Management, Network Security, Information Privacy, Malware Protection, Email Security, Mitigation

LearnKartS
Skills you'll gain: Security Controls, Cybersecurity, Encryption, Cyber Attacks, Information Systems Security, Cryptographic Protocols, Threat Management, Vulnerability Assessments, Vulnerability, Cyber Security Assessment, Vulnerability Scanning, Threat Detection, Cloud Security, Key Management, Asset Protection, Security Awareness, Gap Analysis

Skills you'll gain: Cryptography, Encryption, Risk Management Framework, Multi-Factor Authentication, Cyber Attacks, Cybersecurity, Identity and Access Management, Authentications, Security Controls, Threat Management, Data Security, Information Privacy, Cyber Risk, Authorization (Computing)

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Exploitation techniques, Data Encryption Standard, Threat Modeling, Security Awareness, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, AI Security, Vulnerability Assessments, Application Security, Security Engineering, Artificial Intelligence, SQL