More to explore:

All Results

  • Skills you'll gain: Interviewing Skills, Verbal Communication Skills, Cybersecurity, Communication Strategies, Communication, Professional Development, Penetration Testing, Personal Attributes, Stress Management, Branding, Adaptability, Collaboration, Negotiation, Digital Forensics

  • Skills you'll gain: Metasploit, Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Cyber Operations, Malware Protection, Network Protocols, Security Testing, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP)

  • Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Network Analysis

  • University of Colorado System

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies

  • Skills you'll gain: Virtual Local Area Network (VLAN), Network Planning And Design, Network Troubleshooting, Internet Of Things, Network Architecture, Network Security, Network Engineering, Network Protocols, Virtual Private Networks (VPN), Network Administration, Computer Networking, Routing Protocols, System Configuration, Network Monitoring, Local Area Networks, Networking Hardware, Network Infrastructure, Network Routers, General Networking, Network Switches

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Cyber Security Strategy, Security Testing, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Linux, Linux Administration

What brings you to Coursera today?

  • Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Exploit development, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Security Testing, Scripting, Vulnerability Assessments, Hardening, Brute-force attacks, General Networking, Scripting Languages, Shell Script, Network Administration, Cybersecurity, Network Security

  • University of Colorado System

    Skills you'll gain: Penetration Testing, Exploit development, Metasploit, Application Security, Security Testing, Vulnerability Scanning, Cyber Security Assessment, Brute-force attacks, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Memory Management, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation

  • LearnKartS

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Vulnerability Scanning, Security Testing, Cyber Security Assessment, Cybersecurity, Network Security, Cyber Attacks, Cryptography, Kubernetes, Application Security, Cloud Infrastructure, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Threat Hunting, Cyber Operations, Security Controls, Security Awareness, Cyber Risk, Security Strategy

  • Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Security Testing, Network Security, Cyber Security Assessment, Cybersecurity, Cloud Computing, Cyber Attacks, Brute-force attacks, Exploitation techniques, Human Factors (Security), Web Applications, Mobile Security, Internet Of Things, Wireless Networks

  • Skills you'll gain: Email Security, Cloud Computing Architecture, Technical Support, Technical Support and Services, Cloud Services, Cloud Deployment, Generative AI, Hardware Troubleshooting, IT Service Management, Cloud Security, Cloud Technologies, Generative AI Agents, Cloud Infrastructure, Cloud Computing, Professional Networking, Data Storage, Peripheral Devices, Database Administration, Information Technology, Customer Service

  • Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, System Configuration, Digital Forensics