All Results
Status: Free TrialSkills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Security Testing, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Linux, Linux Administration
Status: Free TrialSkills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Cyber Security Policies, Network Analysis
Status: Free TrialSkills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, System Configuration, Digital Forensics
Status: Free TrialSkills you'll gain: Linux Commands, Bash (Scripting Language), Shell Script, File Management, Unix Shell, Linux, File Systems, Unix Commands, Linux Servers, Scripting, Command-Line Interface, Linux Administration, Scripting Languages, Unix, File I/O, grep, Operating Systems, Package and Software Management, Network Protocols, OS Process Management
Status: Free TrialUniversity of California, Irvine
Skills you'll gain: Grammar, Language Competency, English Language, Vocabulary, Language Learning
Status: PreviewBoard Infinity
Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Command-Line Interface, Security Testing, Linux Commands, Cyber Operations, Cybersecurity, Information Systems Security, Linux, Software Installation, Network Security, Linux Administration, Network Analysis
What brings you to Coursera today?
Status: Free TrialSkills you'll gain: Metasploit, Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Cyber Operations, Malware Protection, Network Protocols, Security Testing, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP)
Status: Free TrialSkills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Security Testing, Mobile Security, Test Script Development, Scripting, Android (Operating System), Human Factors (Security), Scripting Languages, Authentications, Network Analysis, Automation, Virtual Networking, Virtual Environment
Status: Free TrialUniversity of Colorado System
Skills you'll gain: Penetration Testing, Exploit development, Metasploit, Application Security, Security Testing, Cyber Security Assessment, Vulnerability Scanning, Brute-force attacks, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Memory Management, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
Status: Free TrialSkills you'll gain: Exploit development, Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Security Testing, Data Import/Export, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, SQL, Command-Line Interface
Status: PreviewYale University
Skills you'll gain: Psychology, Mental Health Diseases and Disorders, Child Development, Human Development, Human Learning, Psychological Evaluations, Psychotherapy, Social Sciences, Cognitive Behavioral Therapy, Learning Theory, Sensory Systems Analysis, Scientific Methods, Critical Thinking, Problem Solving
Status: Free TrialSkills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Security Testing, Vulnerability Assessments, Network Analysis, Exploitation techniques, Linux, System Configuration, Linux Administration, Virtual Machines, Linux Commands, Operating Systems, Software Installation