More to explore:

All Results

  • Status: Free Trial

    Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Cyber Attacks, Vulnerability Assessments, Hardware Architecture, Information Systems Security, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, VPN Clients, Systems Architecture, Authentications

  • Status: Free Trial

    New York University

    Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Cyber Security Assessment

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

  • Status: Free Trial

    Skills you'll gain: Networking Hardware, Network Security, TCP/IP, Network Protocols, Network Administration, Endpoint Security, Routing Protocols, Network Routing, Cybersecurity, Endpoint Detection and Response, Cyber Threat Intelligence, Firewall, Network Infrastructure, Network Architecture, Intrusion Detection and Prevention, Local Area Networks, General Networking, Dynamic Host Configuration Protocol (DHCP), Network Routers, Data Loss Prevention

  • Status: Free Trial

    Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Authentications, Authorization (Computing), Application Security, Security Controls, Personally Identifiable Information, Security Awareness, Endpoint Security, Identity and Access Management, Information Privacy, Cryptography, Data Loss Prevention, Malware Protection, Hardening, Encryption, Vulnerability Assessments, Multi-Factor Authentication, Data Integrity

What brings you to Coursera today?

  • Status: Free Trial

    Skills you'll gain: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Cloud Computing Architecture, Authentications, Incident Management, Endpoint Detection and Response, Risk Analysis, Network Security, Compliance Training, Risk Mitigation, Risk Management Framework, Cyber Governance, Regulatory Compliance, Cloud Computing, Application Security, Cyber Risk, Information Systems Security, Risk Management

  • Status: Free Trial

    Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Network Security, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Risk Analysis, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Data Security, Authentications, Security Testing, Cloud Security, Security Strategy, Threat Management, Endpoint Detection and Response, Incident Management, Risk Management, Cyber Attacks

  • Status: New
    Status: Preview

    Birla Institute of Technology & Science, Pilani

    Skills you'll gain: Encryption, Information Systems Security, Threat Modeling, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Threat Management, Application Security, Data Security, Computer Security, Security Management, Network Security, Incident Response, Data Encryption Standard, Cyber Security Policies, Cryptography, Intrusion Detection and Prevention, Security Controls, Data Integrity, Authentications

  • Status: Free Trial

    Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Network Security, Threat Management, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Digital Forensics, Security Controls, Cyber Security Policies, Infrastructure Security, Multi-Factor Authentication, Human Factors (Security)

  • Status: Preview

    University of London

    Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, ISO/IEC 27001, Threat Management, Risk Management Framework, Security Controls, Data Integrity