More to explore:

All Results

  • Skills you'll gain: Malware Protection, Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Loss Prevention, Data Security, Network Security, Human Factors (Security), Threat Detection, Security Controls, Email Security, Wireless Networks

  • Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Vulnerability Management, Development Environment, Security Controls, DevOps, Data Security, Software Development Life Cycle

  • Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Threat Management, Cybersecurity, Computer Security Incident Management, IT Security Architecture, Cloud Security, Security Architecture Review, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Risk Management

  • Kennesaw State University

    Skills you'll gain: Email Security, Wireless Networks, Mobile Security, Incident Response, Cybersecurity, Cyber Security Assessment, Personally Identifiable Information, Cyber Attacks, Firewall, General Networking, Threat Detection, Cyber Security Policies, Computer Security Awareness Training, Proxy Servers, Computer Security Incident Management, Network Security, Security Awareness, Threat Management, Cyber Risk, Social Media

  • Skills you'll gain: Security Controls, Multi-Factor Authentication, Security Management, Authorization (Computing), User Accounts, Content Management Systems, User Provisioning, Identity and Access Management, Data Security, Authentications, Data Management, Data Access, IT Security Architecture, Encryption

  • Skills you'll gain: Security Awareness, Information Systems Security, Cybersecurity, Cyber Security Strategy, Cyber Security Policies, Information Privacy, Data Sharing, Telecommuting, Professional Development

What brings you to Coursera today?

  • Skills you'll gain: Vulnerability Scanning, Incident Response, Vulnerability Assessments, Cloud Security, Threat Management, Endpoint Security, Cyber Threat Intelligence, Risk Management, Risk Management Framework, Incident Management, Vulnerability Management, Security Management, Cyber Security Assessment, Intrusion Detection and Prevention, Threat Detection, Cloud Computing, Security Strategy, Cyber Security Strategy, Network Security, Cryptography

  • Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Cybersecurity, Security Testing, IT Security Architecture, Cyber Security Assessment, Cyber Security Strategy, Security Strategy, Security Management, Cyber Risk, Risk Management Framework, Risk Management, Information Systems Security, Vulnerability Scanning, Vulnerability Assessments, Security Controls, Penetration Testing, Incident Response, Vendor Management

  • Skills you'll gain: Microsoft 365, Azure Active Directory, Threat Management, Identity and Access Management, Threat Detection, Law, Regulation, and Compliance, Regulatory Compliance, Information Privacy, Regulatory Requirements, Authentications, Compliance Management, Microsoft Teams, People Analytics, Employee Engagement, Multi-Factor Authentication, Data Governance

  • Skills you'll gain: Security Engineering, Security Requirements Analysis, Risk Management Framework, Systems Engineering, Information Systems Security Assessment Framework (ISSAF), System Implementation, Information Systems Security, Security Controls, Security Management, Information Assurance, Verification And Validation, Systems Development Life Cycle, Systems Integration, Change Control

  • Skills you'll gain: Incident Response, Security Management, Computer Security Incident Management, Security Strategy, Cloud Security, Cryptographic Protocols, Cybersecurity, Cyber Governance, Cryptography, Public Key Infrastructure, Network Security, Digital Forensics, Risk Management

  • Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Security Awareness, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Security Strategy, Cyber Risk, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Identity and Access Management, Data Management, Cryptography