All Results

Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Network Analysis

Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Exploit development, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Security Testing, Scripting, Vulnerability Assessments, Hardening, Brute-force attacks, General Networking, Scripting Languages, Shell Script, Network Administration, Cybersecurity, Network Security

LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Vulnerability Scanning, Kubernetes, Cloud Infrastructure, Cyber Security Strategy, Email Security, Virtualization, SQL

Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, General Networking, Network Administration, Exploitation techniques, Cybersecurity, Data Ethics, Vulnerability Scanning, Network Security, System Configuration, Software Installation, Virtual Machines

SAE Institute México
Skills you'll gain: Exploitation techniques, Penetration Testing, Vulnerability Scanning, Cyber Operations, Vulnerability Assessments, Cybersecurity, Information Systems Security, Security Testing, General Networking, Network Protocols

Skills you'll gain: Penetration Testing, Metasploit, Exploitation techniques, Cloud Security, Vulnerability Scanning, Security Testing, Network Security, Application Security, Vulnerability Assessments, Cybersecurity, Mobile Security, Wireless Networks, Human Factors (Security), Network Analysis, Linux, Technical Communication
What brings you to Coursera today?

LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Vulnerability Scanning, Security Testing, Cyber Security Assessment, Cybersecurity, Network Security, Cyber Attacks, Cryptography, Kubernetes, Application Security, Cloud Infrastructure, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Threat Hunting, Cyber Operations, Security Controls, Security Awareness, Cyber Risk, Security Strategy

Skills you'll gain: Data Ethics, Prompt Engineering, AI literacy, Responsible AI, Data Synthesis, Personally Identifiable Information, LLM Application, Information Privacy, Large Language Modeling, Qualitative Research, Data Integrity, Performance Analysis, Key Performance Indicators (KPIs), Performance Measurement, Variance Analysis, Gap Analysis, Market Opportunities, Business Development, Business Strategy, Business Planning

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Network Security, Cryptography, Threat Management, Information Systems Security, Threat Detection, Cloud Security

Skills you'll gain: Open Web Application Security Project (OWASP), AI Security, Vulnerability Assessments, Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Security Testing, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Linux, Linux Administration

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Cryptography, Mobile Security, Cryptographic Protocols, Security Testing, Vulnerability Scanning, Cyber Security Assessment, Application Security, Operating System Administration, Network Security, Operating Systems, Encryption, Hardening