More to explore:

All Results

  • Skills you'll gain: Security Controls, Security Awareness, Change Control, Computer Security Awareness Training, Cybersecurity, Security Management, Information Assurance, Data Security, Safety and Security, Cyber Security Policies, Data Ethics, Human Factors (Security), Cyber Security Assessment, Data Integrity, Authorization (Computing), Identity and Access Management

  • University of Colorado System

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies

  • Skills you'll gain: AI Security, MITRE ATT&CK Framework, Penetration Testing, Incident Response, Cyber Threat Hunting, Cybersecurity, Cyber Threat Intelligence, DevSecOps, Digital Forensics, Cloud Security, Patch Management, Cyber Security Assessment, Exploitation techniques, Network Security, Computer Security Incident Management, Disaster Recovery, Cryptography, Incident Management, Responsible AI, DevOps

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

  • New York University

    Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Cyber Security Assessment

What brings you to Coursera today?

  • University of California, Davis

    Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Security Strategy, Vulnerability Scanning, Vulnerability Assessments, Security Testing, Application Security, Software Design, C and C++, Linux Administration, System Design and Implementation, Java, Programming Principles, Cybersecurity

  • University of California, Irvine

    Skills you'll gain: Threat Modeling, Threat Management, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Risk Management Framework, Security Strategy, Cyber Governance, Risk Mitigation, Vendor Management, Business Continuity, Risk Control, Vulnerability Assessments, Security Management, Cyber Risk, Vendor Relationship Management, Compliance Management, Supplier Risk Management, Supplier Management

  • Birla Institute of Technology & Science, Pilani

    Skills you'll gain: Encryption, Information Systems Security, Threat Modeling, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Threat Management, Application Security, Data Security, Computer Security, Security Management, Network Security, Incident Response, Data Encryption Standard, Cyber Security Policies, Cryptography, Intrusion Detection and Prevention, Security Controls, Data Integrity, Authentications

  • University of London

    Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, ISO/IEC 27001, Threat Management, Risk Management Framework, Security Controls, Data Integrity

  • Skills you'll gain: Security Controls, Multi-Factor Authentication, Security Management, Authorization (Computing), User Accounts, Content Management Systems, User Provisioning, Identity and Access Management, Data Security, Authentications, Data Management, Data Access, IT Security Architecture, Encryption

  • Skills you'll gain: IT Security Architecture, Information Systems Security, Network Security, Security Controls, Cybersecurity, Security Awareness, AI Security, Encryption, Cryptography, Security Strategy, Computer Security Awareness Training, Authorization (Computing), Threat Management, Firewall, Authentications, Identity and Access Management, Threat Detection, Hardening, Malware Protection, Cryptographic Protocols