More to explore:

All Results

  • Skills you'll gain: Digital Forensics, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Cyber Security Assessment, Brute-force attacks, Vulnerability Assessments, Security Awareness

  • Status: Job Skills

    Skills you'll gain: Operating System Administration, Digital Forensics, Cyber Threat Hunting, Email Security, Incident Response, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Penetration Testing, Database Management, IT Security Architecture, Cyber Threat Intelligence, Interviewing Skills, Cybersecurity, Cyber Security Assessment

  • Skills you'll gain: Open Web Application Security Project (OWASP), SonarQube, Threat Modeling, Secure Coding, Application Security, Security Testing, DevSecOps, Code Review, Maintainability, Vulnerability Scanning, Software Quality (SQA/SQC), Risk Mitigation, Software Quality Assurance, MITRE ATT&CK Framework, Cyber Security Assessment, Vulnerability Assessments, Software Technical Review, Continuous Integration, Vulnerability Management, Cyber Attacks

  • Cisco Learning and Certifications

    Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Intelligence, Cyber Threat Hunting, Key Management, Data Security, Malware Protection, Network Security, Threat Modeling, Computer Security Incident Management, File Systems, Endpoint Security, Cryptography, Linux, Operating System Administration, Vulnerability Assessments, Encryption, Incident Management, Threat Detection, Cybersecurity

  • Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Security Strategy, IT Security Architecture, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cyber Security Assessment, Network Security, Application Security, DevSecOps, Malware Protection, Security Management, Cloud Security, Encryption, Authentications

  • Cisco Learning and Certifications

    Skills you'll gain: OSI Models, Network Security, Network Protocols, Network Performance Management, Network Architecture, Network Monitoring, Role-Based Access Control (RBAC), Network Troubleshooting, Network Administration, Computer Networking, TCP/IP, Network Planning And Design, Cybersecurity, Routing Protocols, Firewall, Network Routing, Network Analysis, IT Infrastructure, Cloud Computing, Automation

What brings you to Coursera today?

  • Skills you'll gain: Operating System Administration, Linux Administration, Microsoft Windows, Command-Line Interface, Operating Systems, System Configuration, Event Monitoring, Authorization (Computing), Desktop Support, OS Process Management, Network Security, Package and Software Management, Information Technology, IT Automation, Network Administration, General Networking, Software Installation

  • University of Colorado System

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies

  • Skills you'll gain: Cyber Threat Intelligence, Cyber Operations, Cyber Threat Hunting, Threat Modeling, Cybersecurity, Cyber Security Strategy, Network Security, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Cyber Attacks, Linux Commands, Linux, Cyber Engineering, Network Administration, Operating System Administration, Hardening, Network Monitoring, Exploitation techniques, Security Awareness, Operating Systems

  • Skills you'll gain: Email Security, Public Key Infrastructure, Encryption, Cryptography, IT Security Architecture, Network Security, Cybersecurity, Hardening, Endpoint Detection and Response, Data Security, Cryptographic Protocols, Network Architecture, Advanced Encryption Standard (AES), Key Management, Authorization (Computing), Cyber Attacks, Information Technology, Cyber Security Strategy, Penetration Testing, Computer Security Incident Management

  • Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Linux, Linux Commands, Incident Response, Network Security, Cybersecurity, TCP/IP, Linux Administration, Network Protocols, Cloud Computing Architecture, Cloud Security, Cyber Attacks

  • Skills you'll gain: Command-Line Interface, Virtualization and Virtual Machines, Network Security, Virtualization, Operating Systems, Hardware Troubleshooting, Information Technology Operations, Network Troubleshooting, Computer Hardware, Network Support, Cloud Computing, Mac OS, Security Controls, Microsoft Windows, Information Systems Security, System Configuration, Operating System Administration, Network Infrastructure, Data Storage, Peripheral Devices