More to explore:

All Results

  • Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Threat Management, Cybersecurity, Endpoint Detection and Response, Cyber Attacks, Cyber Threat Intelligence, Digital Forensics, Intrusion Detection and Prevention, Threat Detection, Network Security, Network Monitoring, Data Security, Business Continuity, Network Analysis, Exploitation techniques, Malware Protection, Memory Management, Analysis

  • Skills you'll gain: Incident Response, Disaster Recovery, Incident Management, Computer Security Incident Management, Business Continuity, Business Continuity Planning, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Policies, Investigation, Threat Detection, Threat Management, Digital Forensics

  • Skills you'll gain: Digital Forensics, Incident Response, Computer Security Incident Management, Threat Detection, Incident Management, Cyber Threat Intelligence, Cybersecurity, Security Management, Data Integrity

  • Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Threat Detection, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Document Management, Cybersecurity, NIST 800-53

  • Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Security Strategy, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Security Testing, IT Security Architecture, Cyber Attacks, Security Information and Event Management (SIEM), Cyber Engineering, Patch Management, Network Security, Malware Protection, Security Management, Digital Forensics, Risk Analysis

  • Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cybersecurity, Cyber Attacks, Digital Forensics

What brings you to Coursera today?

  • Skills you'll gain: Email Security, Cloud Security, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Incident Management, Vulnerability Management, Risk Management Framework, Malware Protection, Security Management, Threat Management, Application Security, Cloud Computing, Cybersecurity, Cyber Attacks, Disaster Recovery, Vulnerability Assessments, Threat Detection, Network Security, Risk Management

  • Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Cybersecurity, Cyber Attacks, Cyber Threat Intelligence, Risk Management Framework, Cyber Risk, IT Service Management, Problem Management, Return On Investment, IT Management, NIST 800-53, Test Planning, Scenario Testing, Simulations, Technical Documentation

  • Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Threat Detection, Threat Management, Security Management, Cybersecurity, Scenario Testing, Technical Communication, Simulations

  • Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cybersecurity, Network Security, Digital Forensics, Network Monitoring, Data Security, Network Analysis, Exploitation techniques, Malware Protection, Memory Management

  • Skills you'll gain: Incident Response, Email Security, Digital Forensics, Network Security, Computer Security Incident Management, Cloud Computing Architecture, Incident Management, Business Continuity Planning, Penetration Testing, Cloud Services, Business Continuity, Security Controls, System Configuration, Generative AI, Data Storage, Peripheral Devices, Cybersecurity, Application Security, Information Technology, Cryptography

  • Skills you'll gain: Incident Response, Computer Security Incident Management, Security Management, Incident Management, Cyber Risk, Regulatory Compliance, Compliance Management, Information Systems Security, Cyber Security Strategy, Cybersecurity, Enterprise Security, Federal Information Security Management Act, Law, Regulation, and Compliance, Regulation and Legal Compliance, Payment Card Industry (PCI) Data Security Standards, Computer Security, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Network Security, Sarbanes Oxley Act (SOX) Compliance, General Data Protection Regulation (GDPR)