More to explore:

All Results

  • Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Security Testing, Mobile Security, Test Script Development, Scripting, Android (Operating System), Human Factors (Security), Scripting Languages, Authentications, Network Analysis, Automation, Virtual Networking, Virtual Environment

  • Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, System Configuration, Digital Forensics

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Cyber Security Strategy, Security Testing, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Linux, Linux Administration

  • Board Infinity

    Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Command-Line Interface, Linux Commands, Security Testing, Cyber Operations, Cybersecurity, Information Systems Security, Linux, Software Installation, Network Security, Linux Administration, Network Analysis

  • Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Security Testing, Vulnerability Assessments, Network Analysis, Exploitation techniques, Linux, System Configuration, Linux Administration, Virtual Machines, Linux Commands, Operating Systems, Software Installation

  • Skills you'll gain: Penetration Testing, Malware Protection, Cyber Security Assessment, Cyber Security Strategy, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Intrusion Detection and Prevention, Email Security, Vulnerability Assessments, Network Security, Human Factors (Security), Network Analysis, Data Persistence

What brings you to Coursera today?

  • Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Exploitation techniques, Cyber Security Assessment, Unix, Security Testing, Network Security, Cybersecurity, Information Systems Security, Cyber Attacks, Network Analysis, Web Applications, Virtual Machines, Web Servers

  • Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Security Testing, Brute-force attacks, Vulnerability Assessments, Authentications, Wireless Networks, Network Security, Linux, Encryption, Microsoft Windows, Network Analysis, Data Persistence

  • Skills you'll gain: Exploit development, Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Security Testing, Data Import/Export, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, SQL, Command-Line Interface

  • Skills you'll gain: Vulnerability Scanning, Network Security, Penetration Testing, Configuration Management, System Configuration, Firewall, Linux Commands, Servers, Command-Line Interface, TCP/IP, Network Analysis, Software Versioning

  • Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Exploitation techniques, Test Tools, Virtual Machines, Technical Documentation, Microsoft Windows, Scripting

  • Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Vulnerability Management, Security Testing, Cybersecurity, Linux, Technical Documentation