All Results

Skills you'll gain: IT Security Architecture, Endpoint Security, Zero Trust Network Access, Application Security, Security Strategy, Hardening, Microsoft Servers, Data Security, Security Management, Vulnerability Scanning, Patch Management

Skills you'll gain: Cloud Security, Data Governance, User Provisioning, Data Management, Data Security, Azure Active Directory, Cloud Development, Secure Coding, IT Security Architecture, Cloud Applications, Application Security, Identity and Access Management, Key Management, Encryption

University of Colorado System
Skills you'll gain: Risk Management Framework, Infrastructure Security, Cyber Security Policies, Continuous Monitoring, Cyber Security Assessment, Security Management, Cyber Governance, Cybersecurity, Cyber Security Strategy, Cyber Risk, Cyber Attacks, Dependency Analysis

Whizlabs
Skills you'll gain: Infrastructure Security, Vulnerability Scanning, Network Security, Amazon Web Services, Firewall, Vulnerability Assessments, Network Infrastructure, Virtual Networking, Security Controls, Cloud Security, Vulnerability Management, Endpoint Security, Network Planning And Design, Distributed Denial-Of-Service (DDoS) Attacks, Load Balancing

Skills you'll gain: API Design, Back-End Web Development, Data Security, Application Programming Interface (API), IT Infrastructure, Application Security, Infrastructure Security, Data Integrity, Servers, Server Administration

Starweaver
Skills you'll gain: Network Security, Network Planning And Design, VPN Clients, IT Security Architecture, Network Engineering, Virtual Private Networks (VPN), Network Administration, Cyber Security Strategy, Network Architecture, Firewall, Security Controls, Remote Access Systems, Network Monitoring, Intrusion Detection and Prevention, Virtual Local Area Network (VLAN), Threat Management, Threat Detection, Continuous Monitoring, Authentications, Incident Response
What brings you to Coursera today?

Skills you'll gain: Threat Management, Threat Detection, Security Requirements Analysis, Infrastructure Security, Software-Defined Networking, Network Architecture, Network Planning And Design, Network Security, Cloud-Based Integration, Cloud Infrastructure, Network Infrastructure, Internet Of Things, Multi-Cloud, Cloud Security, Technology Solutions

New York University
Skills you'll gain: Cyber Attacks, Infrastructure Security, Mobile Security, Enterprise Security, Cyber Risk, Cyber Governance, Cyber Security Policies, Cybersecurity, IT Security Architecture, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Awareness, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Cryptographic Protocols, Cryptography, Data Integrity

University of Colorado System
Skills you'll gain: Infrastructure Security, Cyber Risk, Cyber Security Policies, Cyber Security Assessment, Cybersecurity, Security Management, Cyber Security Strategy, Risk Management Framework, Technology Roadmaps, Network Infrastructure, Transportation Operations, Mobile Security

Skills you'll gain: Data Integration, Microsoft Azure, Authorization (Computing), Azure Active Directory, Event-Driven Programming, Cloud Infrastructure, Authentications, Data Storage Technologies, Cloud Storage, Disaster Recovery, Data Architecture, Cloud Computing Architecture, Database Design, Cloud Security, IT Security Architecture, Role-Based Access Control (RBAC), Application Design, Application Programming Interface (API), Application Deployment, Identity and Access Management

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Cryptographic Protocols, Vulnerability Management, Encryption, Cybersecurity, Infrastructure Security, Computer Security, Public Key Infrastructure, Cyber Security Assessment, Data Integrity

Skills you'll gain: Endpoint Security, Infrastructure Security, Security Management, Network Security, Cyber Security Policies, Security Controls, Data Security, Computer Security, Security Strategy, Application Security, IT Infrastructure, Data Integrity