All Results

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Cyber Attacks, Encryption, Key Management, Multi-Factor Authentication, Single Sign-On (SSO)

University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Policies, Cyber Risk, Cyber Attacks, Cyber Governance, Cyber Security Strategy, Security Management, Infrastructure Security, Data Security, Threat Modeling, Computer Security, Security Awareness, Risk Management, Enterprise Security, Vulnerability, Governance, General Networking, Public Safety and National Security, Threat Detection, Artificial Intelligence

Skills you'll gain: Digital Forensics, Risk Management, Risk Management Framework, Incident Response, Threat Management, Risk Analysis, Business Risk Management, Cyber Attacks, Cyber Security Policies, Security Management, Secure Coding, Computer Security Incident Management, Cyber Security Assessment, Application Security, ISO/IEC 27001, Law, Regulation, and Compliance, Data Security, Malware Protection, Incident Management, Penetration Testing

LearnKartS
Skills you'll gain: Cyber Security Strategy, Cyber Threat Intelligence, Threat Management, Network Model, IT Security Architecture, Exploitation techniques, Security Controls, Security Awareness, System Design and Implementation, Cryptography, Resilience, Service Recovery

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, Routing Protocols, TCP/IP, Internet Of Things, Network Security, Cyber Attacks, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software), Containerization

28DIGITAL
Skills you'll gain: Cybersecurity, Cyber Attacks, AI Security, Network Security, Information Systems Security, Data Ethics, Deep Learning, Responsible AI, Intrusion Detection and Prevention, Artificial Intelligence and Machine Learning (AI/ML), Malware Protection, Natural Language Processing, Artificial Intelligence, Machine Learning Methods, Threat Detection, Anomaly Detection, Machine Learning, Supervised Learning, Classification Algorithms
What brings you to Coursera today?

Kennesaw State University
Skills you'll gain: Incident Response, Contingency Planning, Disaster Recovery, Computer Security Incident Management, Business Continuity Planning, Incident Management, Crisis Management, Cybersecurity, Business Continuity, Cyber Attacks, Risk Analysis

Skills you'll gain: Risk Analysis, Cyber Risk, Risk Management, Threat Management, Security Controls, Risk Management Framework, Cyber Attacks, Vulnerability Assessments, Risk Mitigation, Cyber Security Assessment, Cyber Security Strategy, Cyber Governance, Cybersecurity, Information Assurance, Data Security, Vendor Management, Stakeholder Communications, Business Communication

Skills you'll gain: AI Security, Threat Detection, Large Language Modeling, Intrusion Detection and Prevention, LLM Application, Cybersecurity, Cyber Security Strategy, Applied Machine Learning, Fraud detection, AI Integrations, Cyber Engineering, IT Automation, Machine Learning Methods, Cyber Attacks, Anomaly Detection, Federated Learning, Malware Protection, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Cyber Risk

Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Security Strategy, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Security Testing, IT Security Architecture, Cyber Attacks, Security Information and Event Management (SIEM), Cyber Engineering, Patch Management, Network Security, Malware Protection, Security Management, Digital Forensics, Risk Analysis

Starweaver
Skills you'll gain: Threat Detection, Endpoint Security, Hardening, Firewall, Cybersecurity, Network Security, Cyber Attacks, Cyber Security Strategy, Cyber Operations, Authorization (Computing), Security Controls, Network Monitoring, Data Security, Identity and Access Management
