More to explore:

All Results

  • Skills you'll gain: Email Security, Public Key Infrastructure, Encryption, Cryptography, IT Security Architecture, Network Security, Cybersecurity, Hardening, Endpoint Detection and Response, Data Security, Cryptographic Protocols, Network Architecture, Advanced Encryption Standard (AES), Key Management, Authorization (Computing), Cyber Attacks, Information Technology, Cyber Security Strategy, Penetration Testing, Computer Security Incident Management

  • Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Network Security, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis

  • Skills you'll gain: Email Security, Cybersecurity, Hardening, Authorization (Computing), Cyber Attacks, Security Awareness, Security Controls, Threat Management, Encryption, Data Security, Identity and Access Management, Authentications, Application Security, Endpoint Security, Threat Detection, Cryptography, Malware Protection, Patch Management, Multi-Factor Authentication

  • Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security, Computer Security Awareness Training, Cyber Security Strategy, Security Awareness, Threat Management, Network Security, Information Privacy, Malware Protection, Email Security, Mitigation

  • Skills you'll gain: Digital Forensics, Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Security Testing, Cryptography, Security Controls, Cryptographic Protocols, Cyber Security Assessment, Cybersecurity, Authorization (Computing), Cloud Computing, Malware Protection, Cyber Attacks, Data Integrity

What brings you to Coursera today?

  • Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Network Security, Threat Management, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Cyber Security Policies, Multi-Factor Authentication, Human Factors (Security)

  • Skills you'll gain: Threat Detection, Endpoint Security, Hardening, Firewall, Cybersecurity, Network Security, Cyber Attacks, Cyber Security Strategy, Cyber Operations, Authorization (Computing), Security Controls, Network Monitoring, Data Security, Identity and Access Management

  • Skills you'll gain: AI Security, MITRE ATT&CK Framework, Penetration Testing, Incident Response, Cyber Threat Hunting, Cybersecurity, Cyber Threat Intelligence, DevSecOps, Digital Forensics, Cloud Security, Patch Management, Cyber Security Assessment, Exploitation techniques, Network Security, Computer Security Incident Management, Disaster Recovery, Cryptography, Incident Management, Responsible AI, DevOps

  • Skills you'll gain: Disaster Recovery, Hardware Architecture, Computer Hardware, Database Management, Relational Databases, Computer Systems, Databases, Computer Architecture, Cybersecurity, Operating Systems, Cyber Attacks, SQL, TCP/IP, Information Technology, Database Systems, General Networking, Information Systems Security, Cyber Security Policies, Networking Hardware, Security Management

  • Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Security Testing, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Vulnerability Scanning, Operating Systems, Cyber Risk, Cloud Services, Exploitation techniques, General Networking, Cyber Governance, Cyber Security Strategy

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Exploitation techniques, Data Encryption Standard, Threat Modeling, Security Awareness, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, AI Security, Vulnerability Assessments, Application Security, Security Engineering, Artificial Intelligence, SQL