All Results

Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Security Testing, Security Controls, Brute-force attacks, Virtual Environment, Cybersecurity, Virtual Machines, Technical Writing, Technical Documentation, Linux

Skills you'll gain: Penetration Testing, Exploitation techniques, Scenario Testing, Cybersecurity, Vulnerability Assessments, Linux Administration, Linux Servers, Linux, Command-Line Interface, Linux Commands, Cryptography, File Management, Microsoft Windows, Unix Shell, Virtual Machines

Total Seminars
Skills you'll gain: Penetration Testing, Metasploit, Exploitation techniques, Exploit development, Vulnerability Scanning, Security Testing, Technical Communication, Scripting, Technical Writing, Security Engineering, Technical Documentation, Bash (Scripting Language), Code Review, Security Requirements Analysis, Windows PowerShell, Security Awareness, Python Programming, Linux, Persistence, Applicant Tracking Systems

Packt
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Assessments, Security Testing, Data Security, Cybersecurity, Exploitation techniques, Test Tools, Cyber Security Strategy, Security Controls, Authorization (Computing), Technical Documentation, Computing Platforms, Requirements Analysis, Technical Communication, Document Management

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Cyber Security Strategy, Security Testing, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Linux, Linux Administration

Skills you'll gain: Penetration Testing, Security Testing, Hardening, Test Script Development, Brute-force attacks, Business Logic, Cloud Security, Network Analysis, Programming Principles, API Testing, General Data Protection Regulation (GDPR), Cloud Computing, Wireless Networks, Data Persistence, Application Programming Interface (API), Data Security
What brings you to Coursera today?

Skills you'll gain: Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Network Protocols, Network Analysis, Network Monitoring, Image Analysis, Virtual Machines, Virtualization and Virtual Machines, Virtual Environment, Open Source Technology, Malware Protection, Command-Line Interface, Software Installation, File Management, Microsoft Windows

Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Exploit development, Vulnerability Scanning, Exploitation techniques, Security Testing, Vulnerability Assessments, Hardening, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL

Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Exploitation techniques, Test Tools, Virtual Machines, Technical Documentation, Microsoft Windows, Scripting

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cybersecurity, Cryptography, Cryptographic Protocols, Exploitation techniques, Security Testing, Encryption, Technical Writing, Test Tools, Human Factors (Security), Technical Communication

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Security Testing, Mobile Security, Test Script Development, Scripting, Android (Operating System), Human Factors (Security), Scripting Languages, Authentications, Network Analysis, Automation, Virtual Networking, Virtual Environment

Skills you'll gain: Penetration Testing, Exploitation techniques, Test Script Development, Technical Communication, Scripting, Technical Writing, Programming Principles, Automation, Data Security