All Results

Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Cybersecurity, Data Preprocessing, Data Management, Data Quality, Technical Communication, Automation, Requirements Analysis

Skills you'll gain: Threat Modeling, AI Security, DevSecOps, Security Testing, Continuous Monitoring, CI/CD, Threat Detection, DevOps, Continuous Integration, Test Script Development, API Testing, Endpoint Security, Scripting, Unit Testing, Scripting Languages, Exploitation techniques, Integration Testing, Data Validation

Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Cyber Threat Hunting, Computer Security Incident Management, Incident Response, Threat Detection, Incident Management

Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Threat Detection, Threat Management, Security Management, Cybersecurity, Scenario Testing, Technical Communication, Simulations

Universiteit Leiden
Skills you'll gain: Risk Management, Safety and Security, Security Management, Threat Management, Case Studies, Computer Security Incident Management, Public Safety and National Security, Risk Analysis, Cybersecurity, Incident Management, International Relations, Crisis Intervention, Policy Analysis, Governance, Public Policies

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning
What brings you to Coursera today?

Total Seminars
Skills you'll gain: Open Web Application Security Project (OWASP), User Accounts, Network Security, Incident Response, Security Controls, Command-Line Interface, Hardening, Cryptographic Protocols, Public Key Infrastructure, Endpoint Security, Cloud Security, Cybersecurity, Security Architecture Review, Identity and Access Management, Vulnerability Scanning, Cryptography, Vulnerability Assessments, Threat Management, Vulnerability Management, Threat Detection

Kennesaw State University
Skills you'll gain: Email Security, Wireless Networks, Mobile Security, Incident Response, Cybersecurity, Cyber Security Assessment, Personally Identifiable Information, Cyber Attacks, Firewall, General Networking, Threat Detection, Cyber Security Policies, Computer Security Awareness Training, Proxy Servers, Computer Security Incident Management, Network Security, Security Awareness, Threat Management, Cyber Risk, Social Media

Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Security Strategy, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Security Testing, IT Security Architecture, Cyber Attacks, Security Information and Event Management (SIEM), Cyber Engineering, Patch Management, Network Security, Malware Protection, Security Management, Digital Forensics, Risk Analysis

Starweaver
Skills you'll gain: Cyber Threat Intelligence, Intelligence Collection and Analysis, Cyber Threat Hunting, MITRE ATT&CK Framework, Threat Modeling, Threat Detection, Threat Management, AI Security, Responsible AI, Malware Protection, Cybersecurity, Requirements Analysis, Technical Communication

Starweaver
Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Management, Information Assurance, Cybersecurity, Cyber Security Strategy, Endpoint Detection and Response, Security Information and Event Management (SIEM), Incident Response, Risk Management Framework, Technical Communication, Automation

Microsoft
Skills you'll gain: Azure Active Directory, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Threat Modeling, Vulnerability Management, Zero Trust Network Access, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Security Information and Event Management (SIEM), Authentications, Encryption, Penetration Testing, Secure Coding, Regulatory Requirements, Cloud Security, Cloud Computing, Active Directory, Operating Systems, Cybersecurity, Computer Security Incident Management