All Results

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning

Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Network Analysis

Skills you'll gain: Operating System Administration, Digital Forensics, Cyber Threat Hunting, Email Security, Incident Response, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Penetration Testing, Database Management, IT Security Architecture, Cyber Threat Intelligence, Interviewing Skills, Cybersecurity, Cyber Security Assessment

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Cyber Security Strategy, Security Testing, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Linux, Linux Administration

Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Vulnerability Management, Development Environment, Security Controls, DevOps, Data Security, Software Development Life Cycle

Total Seminars
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Metasploit, Vulnerability Assessments, Exploitation techniques, Cyber Security Assessment, Exploit development, Network Security, Cybersecurity, Vulnerability Management, Brute-force attacks, Security Testing, MITRE ATT&CK Framework, Test Planning, Cloud Security, Network Analysis, OSI Models, Linux, Web Applications, Ethical Standards And Conduct
What brings you to Coursera today?

Skills you'll gain: Red Hat Enterprise Linux, Linux, Private Cloud, Linux Administration, Package and Software Management, Bash (Scripting Language), Command-Line Interface, Operating System Administration, File Systems, Linux Commands, Linux Servers, User Accounts, IBM Cloud, Unix Shell, File Management, OS Process Management, User Provisioning, Cloud Management, Virtualization, Cloud Computing

Skills you'll gain: Command-Line Interface, Virtualization and Virtual Machines, Network Security, Virtualization, Operating Systems, Hardware Troubleshooting, Information Technology Operations, Network Troubleshooting, Computer Hardware, Network Support, Cloud Computing, Mac OS, Security Controls, Microsoft Windows, Information Systems Security, System Configuration, Operating System Administration, Network Infrastructure, Data Storage, Peripheral Devices

Skills you'll gain: Shell Script, Unix Shell, File Management, User Accounts, Operating System Administration, Unix, Package and Software Management, Systems Administration, File Systems, TCP/IP, Data Maintenance, User Provisioning, Midrange Computer, Unix Commands, System Monitoring, Scripting, Disaster Recovery, System Software, System Configuration, Data Centers

Multiple educators
Skills you'll gain: Incident Response, Email Security, Digital Forensics, Network Security, Computer Security Incident Management, Cloud Computing Architecture, Incident Management, Business Continuity Planning, Penetration Testing, Cloud Services, Business Continuity, Security Controls, System Configuration, Generative AI, Data Storage, Peripheral Devices, Cybersecurity, Application Security, Information Technology, Cryptography

Skills you'll gain: Email Security, Public Key Infrastructure, Encryption, Cryptography, IT Security Architecture, Network Security, Cybersecurity, Hardening, Endpoint Detection and Response, Data Security, Cryptographic Protocols, Network Architecture, Advanced Encryption Standard (AES), Key Management, Authorization (Computing), Cyber Attacks, Information Technology, Cyber Security Strategy, Penetration Testing, Computer Security Incident Management

Skills you'll gain: User Story, Cloud Deployment, CI/CD, Open Web Application Security Project (OWASP), Continuous Integration, Istio, Test Driven Development (TDD), Application Deployment, Kubernetes, Devops Tools, Gherkin (Scripting Language), Jenkins, Agile Software Development, Scrum (Software Development), Test Tools, DevOps, Secure Coding, Grafana, System Monitoring, Agile Methodology