All Results

Skills you'll gain: Incident Response, Hybrid Cloud Computing, Zero Trust Network Access, Incident Management, Computer Security Incident Management, Security Information and Event Management (SIEM), Endpoint Detection and Response, Containerization, Event Monitoring, Enterprise Security, Telecommunications, Cybersecurity, Threat Detection, Security Controls, Network Security, Network Architecture

Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Network Analysis

Skills you'll gain: Penetration Testing, Record Keeping, Vulnerability Scanning, Security Testing, Data Management, Cloud Management, Threat Management, Cyber Security Assessment, Records Management, Cloud Computing Architecture, Authentications, Firewall, Cyber Attacks, Cybersecurity, Cyber Threat Intelligence, Authorization (Computing), Generative Adversarial Networks (GANs), Active Directory, Data Ethics, AI Security

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Cyber Security Strategy, Security Testing, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Linux, Linux Administration

Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Digital Forensics, Risk Management, Risk Management Framework, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Authorization (Computing), Network Security, Threat Management, Event Monitoring, Security Strategy

Skills you'll gain: Jupyter, R (Software), R Programming, Data Analysis Software, Computer Programming Tools, GitHub, Software Development Tools, Data Visualization Software, Data Science, Statistical Programming, Rmarkdown, Cloud Hosting, Scikit Learn (Machine Learning Library), Cloud Computing, Git (Version Control System), Cloud Platforms, Application Programming Interface (API), Other Programming Languages, Query Languages, Python Programming
What brings you to Coursera today?

Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Security Strategy, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Security Testing, IT Security Architecture, Cyber Attacks, Security Information and Event Management (SIEM), Cyber Engineering, Patch Management, Network Security, Malware Protection, Security Management, Digital Forensics, Risk Analysis

Skills you'll gain: Email Security, Cloud Security, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Incident Management, Vulnerability Management, Risk Management Framework, Malware Protection, Security Management, Threat Management, Application Security, Cloud Computing, Cybersecurity, Cyber Attacks, Disaster Recovery, Vulnerability Assessments, Threat Detection, Network Security, Risk Management

University of Houston
Skills you'll gain: Collaborative Software, Digital pedagogy, Education Software and Technology, Collaboration, Learning Management Systems, Teaching, Communication, Technology Strategies, Technology Solutions, Web Applications, Communication Systems, Digital Communications

Skills you'll gain: Cyber Threat Intelligence, Incident Response, Cybersecurity, Computer Security Incident Management, Information Systems Security, Threat Detection, Cyber Risk, Risk Analysis, Computer Security, Digital Forensics, Network Security, Incident Management, Vulnerability Assessments, Criminal Investigation and Forensics, Vulnerability Management, Vulnerability Scanning, Intelligence Collection and Analysis, Risk Management, Risk Mitigation, Network Analysis

Total Seminars
Skills you'll gain: Command-Line Interface, Penetration Testing, Vulnerability Assessments, Security Testing, Vulnerability, Cyber Security Assessment, Vulnerability Scanning, Infrastructure Security, Cyber Operations, Security Controls, Network Monitoring, Network Security, Security Management, Human Factors (Security), Security Strategy, Security Awareness, Event Monitoring, IT Automation, Network Analysis

University of Illinois Urbana-Champaign
Skills you'll gain: Data Storytelling, Business Analytics, Data Visualization Software, Analytical Skills, Exploratory Data Analysis, Data Quality, Data Analysis, Data-Driven Decision-Making, Extract, Transform, Load, Analytics, Data Manipulation, Descriptive Statistics, Data Processing, SQL, Python Programming, Application Programming Interface (API)