More to explore:

All Results

  • Skills you'll gain: LLM Application, Prompt Engineering, Penetration Testing, Vulnerability Assessments, Security Testing, Large Language Modeling, Vulnerability Management, Risking, AI Security, Application Security

  • Skills you'll gain: AI Security, LLM Application, Cyber Security Assessment, Large Language Modeling, Continuous Monitoring, Security Testing, Responsible AI, Threat Modeling, Vulnerability Assessments, Prompt Engineering, Security Controls, Vulnerability Scanning, Security Strategy, AI Personalization, Exploitation techniques, System Implementation

  • Skills you'll gain: Open Web Application Security Project (OWASP), AI Security, Vulnerability Assessments, Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Security Testing, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Linux, Linux Administration

  • Skills you'll gain: Penetration Testing, Metasploit, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cyber Threat Intelligence, Generative AI, Security Testing, Responsible AI, AI Integrations

  • Skills you'll gain: Threat Modeling, Data Loss Prevention, Mobile Security, DevSecOps, MLOps (Machine Learning Operations), Vulnerability Scanning, Model Optimization, Incident Response, LLM Application, Hardening, Application Security, Anomaly Detection, Responsible AI, Security Controls, Data Security, CI/CD, Infrastructure Security, Continuous Monitoring, Penetration Testing, Vulnerability Assessments

What brings you to Coursera today?

  • Skills you'll gain: Cyber Security Assessment, Cybersecurity, Exploitation techniques, Vulnerability Assessments, Persona Development, Coordination, Safety and Security, Record Keeping

  • Skills you'll gain: Ansible, Red Hat Enterprise Linux, Package and Software Management, User Accounts, IT Automation, Software Installation, OS Process Management, Devops Tools, Linux Administration, File Systems, Linux Commands, Network Administration, Data Storage, Automation, Infrastructure as Code (IaC), YAML, Scripting, Linux, Linux Servers, System Configuration

  • Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Human Factors (Security), Information Systems Security, Data Persistence

  • Skills you'll gain: Cloud-Based Integration, User Flows, Embedded Software, Computer Hardware, No-Code Development, System Configuration, Cloud Applications, Interactive Data Visualization, Automation, Command-Line Interface

  • Skills you'll gain: AI Security, AI Orchestration, MLOps (Machine Learning Operations), Model Deployment, Vulnerability Assessments, AI Workflows, Governance Risk Management and Compliance, Retrieval-Augmented Generation, Responsible AI, Compliance Auditing, LLM Application, Personally Identifiable Information, Regulatory Compliance, Regulatory Requirements, Application Deployment, Generative Model Architectures, Decision Intelligence, Model Training, Cloud Deployment, Artificial Intelligence

  • Universidad de los Andes

    Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Digital Forensics, Security Requirements Analysis, Penetration Testing, Incident Management, Human Factors (Security), Threat Detection, Cloud Security, Vulnerability Assessments, Cyber Attacks, Encryption, Cybersecurity, Vulnerability Management, Exploitation techniques, Data Security, Security Management