More to explore:

All Results

  • Skills you'll gain: Threat Modeling, Secure Coding, Application Security, DevSecOps, Open Web Application Security Project (OWASP), Cybersecurity, Security Testing, Mobile Security, Software Development Life Cycle, Cryptographic Protocols, Security Controls, Computer Security, Vulnerability Assessments, Continuous Monitoring, Vulnerability Management, Computer Programming, C and C++, Java Programming, Python Programming, C (Programming Language)

  • Skills you'll gain: Penetration Testing, Record Keeping, Vulnerability Scanning, Security Testing, Data Management, Cloud Management, Threat Management, Cyber Security Assessment, Records Management, Cloud Computing Architecture, Authentications, Firewall, Cyber Attacks, Cybersecurity, Cyber Threat Intelligence, Authorization (Computing), Generative Adversarial Networks (GANs), Active Directory, Data Ethics, AI Security

  • Skills you'll gain: Data Governance, Data Strategy, Data Migration, Correlation Analysis, Security Controls, Data Quality, Data Infrastructure, Metadata Management, SQL, Data Integrity, Cyber Security Assessment, Data Security, Data Validation, Data Pipelines, Dashboard Creation, Data Warehousing, Dashboard, Statistical Analysis, Auditing, Root Cause Analysis

  • Skills you'll gain: Email Security, Cybersecurity, Hardening, Authorization (Computing), Cyber Attacks, Security Awareness, Security Controls, Threat Management, Encryption, Data Security, Identity and Access Management, Authentications, Application Security, Endpoint Security, Threat Detection, Cryptography, Malware Protection, Patch Management, Multi-Factor Authentication

  • Skills you'll gain: Mobile Security, Digital Forensics, Criminal Investigation and Forensics, Cyber Threat Intelligence, Cyber Security Strategy, Investigation, Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Mobile Development, Model Training, Cyber Security Policies, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Data Security, Cyber Governance, Endpoint Security, Machine Learning Methods, iOS Development, Application Security

  • Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cryptography, Cyber Security Strategy, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cybersecurity, IT Security Architecture, Encryption, Information Systems Security, Vulnerability Assessments, Cyber Attacks, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management

What brings you to Coursera today?

  • Skills you'll gain: Incident Response, Security Management, Computer Security Incident Management, Security Strategy, Cloud Security, Cryptographic Protocols, Cybersecurity, Cyber Governance, Cryptography, Public Key Infrastructure, Network Security, Digital Forensics, Risk Management

  • Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, Microsoft Copilot, Data Security, ASP.NET, Encryption, Back-End Web Development, Data Encryption Standard, Authorization (Computing), Data Storage, Identity and Access Management, JSON, Application Security, Application Programming Interface (API), Debugging

  • Skills you'll gain: Computer Security Incident Management, Vulnerability Management, Cyber Security Strategy, Cyber Governance, Incident Response, Cyber Operations, Cyber Threat Intelligence, Encryption, Cyber Attacks, Governance Risk Management and Compliance, Incident Management, Cryptographic Protocols, Threat Detection, Security Strategy, Mobile Security, Network Model, Vulnerability, Security Awareness, Vulnerability Assessments, Vulnerability Scanning

  • University of Colorado System

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies

  • Skills you'll gain: Networking Hardware, Network Security, TCP/IP, Network Protocols, Network Administration, Endpoint Security, Routing Protocols, Network Routing, Cybersecurity, Endpoint Detection and Response, Cyber Threat Intelligence, Firewall, Network Infrastructure, Network Architecture, Intrusion Detection and Prevention, Local Area Networks, General Networking, Dynamic Host Configuration Protocol (DHCP), Network Routers, Data Loss Prevention

  • University at Buffalo

    Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Continuous Monitoring, Incident Response, Cyber Attacks, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Application Security, Computer Security Incident Management, Security Management, Cyber Security Strategy, Information Systems Security, Secure Coding, Cyber Security Policies, Cyber Security Assessment, Threat Management, Threat Detection, Information Assurance, Network Security