More to explore:

All Results

  • Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cyber Attacks, Cybersecurity, Security Requirements Analysis, Security Testing, Threat Modeling, Vulnerability Assessments, Software Design, Encryption, Vulnerability Management, Security Controls, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring

  • Skills you'll gain: Open Web Application Security Project (OWASP), SonarQube, Threat Modeling, Secure Coding, Application Security, Security Testing, DevSecOps, Code Review, Maintainability, Vulnerability Scanning, Software Quality (SQA/SQC), Risk Mitigation, Software Quality Assurance, MITRE ATT&CK Framework, Cyber Security Assessment, Vulnerability Assessments, Software Technical Review, Continuous Integration, Vulnerability Management, Cyber Attacks

  • Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Security Strategy, IT Security Architecture, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cyber Security Assessment, Network Security, Application Security, DevSecOps, Malware Protection, Security Management, Cloud Security, Encryption, Authentications

  • Skills you'll gain: Network Security, Incident Response, Incident Management, Business Continuity Planning, Business Continuity, Disaster Recovery, Security Controls, System Configuration, Configuration Management, Governance, Cyber Operations, Cybersecurity, Security Awareness, Security Management, Computer Security Incident Management, Cyber Attacks, Computer Security Awareness Training, Information Assurance, Data Security, Role-Based Access Control (RBAC)

  • Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Network Security, Cryptography, Threat Management, Information Systems Security, Threat Detection, Cloud Security

  • Skills you'll gain: Incident Response, Email Security, Digital Forensics, Network Security, Computer Security Incident Management, Cloud Computing Architecture, Incident Management, Business Continuity Planning, Penetration Testing, Cloud Services, Business Continuity, Security Controls, System Configuration, Generative AI, Data Storage, Peripheral Devices, Cybersecurity, Application Security, Information Technology, Cryptography

What brings you to Coursera today?

  • Skills you'll gain: Penetration Testing, Record Keeping, Vulnerability Scanning, Security Testing, Data Management, Cloud Management, Threat Management, Cyber Security Assessment, Records Management, Cloud Computing Architecture, Authentications, Firewall, Cyber Attacks, Cybersecurity, Cyber Threat Intelligence, Authorization (Computing), Generative Adversarial Networks (GANs), Active Directory, Data Ethics, AI Security

  • Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Exploitation techniques, Brute-force attacks, Scripting, Network Protocols, Authentications, Scripting Languages, Python Programming, Data Access, Identity and Access Management, Automation

  • University of California, Davis

    Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Security Strategy, Vulnerability Scanning, Vulnerability Assessments, Security Testing, Application Security, Software Design, C and C++, Linux Administration, System Design and Implementation, Java, Programming Principles, Cybersecurity

  • Skills you'll gain: Risk Management Framework, Business Continuity Planning, Incident Response, Risk Mitigation, Cyber Threat Hunting, Cyber Risk, Business Continuity, Risk Management, Computer Security Incident Management, Risk Analysis, Threat Management, Cybersecurity, Vulnerability Management, Security Management, Enterprise Risk Management (ERM), Network Security, Cyber Security Policies, Incident Management, Operational Risk, Business Risk Management

  • Skills you'll gain: Cyber Security Strategy, Incident Response, Cyber Governance, Incident Management, Security Strategy, Computer Security Incident Management, Risk Modeling, Risk Analysis, Cyber Security Policies, Governance Risk Management and Compliance, Cyber Threat Intelligence, Event Monitoring, Cyber Risk, Cybersecurity, Cyber Security Assessment, Governance, Compliance Management, Cyber Operations, Risk Management, Risk Control

  • University of London

    Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Cyber Risk, Encryption, ISO/IEC 27001, Threat Management, Risk Management Framework, Security Controls, Data Integrity