More to explore:

All Results

  • Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Security Strategy, IT Security Architecture, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cyber Security Assessment, Network Security, Application Security, DevSecOps, Malware Protection, Security Management, Cloud Security, Encryption, Authentications

  • Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cryptography, Cyber Security Strategy, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cybersecurity, IT Security Architecture, Encryption, Information Systems Security, Vulnerability Assessments, Cyber Attacks, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management

  • Total Seminars

    Skills you'll gain: Open Web Application Security Project (OWASP), User Accounts, Network Security, Incident Response, Security Controls, Command-Line Interface, Hardening, Cryptographic Protocols, Public Key Infrastructure, Endpoint Security, Cloud Security, Cybersecurity, Security Architecture Review, Identity and Access Management, Vulnerability Scanning, Cryptography, Vulnerability Assessments, Threat Management, Vulnerability Management, Threat Detection

  • Skills you'll gain: Computer Security Incident Management, Cyber Security Strategy, MITRE ATT&CK Framework, Data Integrity

  • Skills you'll gain: OSI Models, Network Troubleshooting, Network Administration, General Networking, Network Infrastructure, Network Monitoring, Network Security, TCP/IP, Virtual Networking, Local Area Networks, Routing Protocols, Network Routing, Virtual Local Area Network (VLAN), Wireless Networks, Networking Hardware, Disaster Recovery, Network Protocols, Network Switches, Cloud Services

  • Status: Job Skills

    Skills you'll gain: Operating System Administration, Digital Forensics, Cyber Threat Hunting, Email Security, Incident Response, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Penetration Testing, Database Management, IT Security Architecture, Cyber Threat Intelligence, Interviewing Skills, Cybersecurity, Cyber Security Assessment

What brings you to Coursera today?

  • Status: Job Skills

    Skills you'll gain: Threat Modeling, Network Security, Threat Management, Vulnerability Management, Intrusion Detection and Prevention, Hardening, Computer Security Incident Management, Security Management, Cyber Threat Intelligence, Security Awareness, Incident Response, Cybersecurity, Network Protocols, Endpoint Detection and Response, Bash (Scripting Language), Debugging, Linux, Web Presence, Python Programming, SQL

  • Skills you'll gain: Cyber Threat Intelligence, Cyber Operations, Cyber Threat Hunting, Threat Modeling, Cybersecurity, Cyber Security Strategy, Network Security, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Cyber Attacks, Linux Commands, Linux, Cyber Engineering, Network Administration, Operating System Administration, Hardening, Network Monitoring, Exploitation techniques, Security Awareness, Operating Systems

  • Status: Job Skills

    Skills you'll gain: Azure Active Directory, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Threat Modeling, Vulnerability Management, Zero Trust Network Access, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Security Information and Event Management (SIEM), Record Keeping, Authentications, Encryption, Penetration Testing, Secure Coding, Regulatory Requirements, Cloud Computing, Active Directory, Operating Systems, Cybersecurity, Computer Security Incident Management

  • Skills you'll gain: Command-Line Interface, Virtualization and Virtual Machines, Network Security, Virtualization, Operating Systems, Hardware Troubleshooting, Information Technology Operations, Network Troubleshooting, Computer Hardware, Network Support, Cloud Computing, Mac OS, Security Controls, Microsoft Windows, Information Systems Security, System Configuration, Operating System Administration, Network Infrastructure, Data Storage, Peripheral Devices

  • Skills you'll gain: Network Security, Incident Response, Incident Management, Business Continuity Planning, Business Continuity, Disaster Recovery, Security Controls, System Configuration, Configuration Management, Governance, Cyber Operations, Cybersecurity, Security Awareness, Security Management, Computer Security Incident Management, Cyber Attacks, Computer Security Awareness Training, Information Assurance, Data Security, Role-Based Access Control (RBAC)

  • Johns Hopkins University

    Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Fraud detection, Model Evaluation, Malware Protection, Cybersecurity, Threat Detection, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Classification Algorithms, Email Security, Network Security, Jupyter, Authentications, Machine Learning Methods, Machine Learning Algorithms, Artificial Intelligence