More to explore:

All Results

  • Skills you'll gain: Criminal Investigation and Forensics, Investigation, Cybersecurity, Data Security, Cyber Governance, Cyber Security Policies, Computer Security, Digital Assets, Security Testing, Data Analysis Software, Cyber Risk, Incident Management

  • Skills you'll gain: Mobile Security, Digital Forensics, Criminal Investigation and Forensics, Cyber Threat Intelligence, Cyber Security Strategy, Investigation, Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Mobile Development, Cyber Security Policies, Model Training, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Data Security, Cyber Governance, Endpoint Security, Machine Learning Methods, iOS Development, Application Security

  • Skills you'll gain: Digital Forensics, Malware Protection, Cybersecurity, Cyber Attacks, Network Security, Data Integrity, Network Analysis, Microsoft Windows, Mac OS, Linux Commands, Web Applications, File Systems

  • Skills you'll gain: Digital Forensics, Incident Response, Computer Security Incident Management, Threat Detection, Incident Management, Cyber Threat Intelligence, Cybersecurity, Security Management, Data Integrity

  • Skills you'll gain: Threat Detection, Endpoint Security, Hardening, Firewall, Cybersecurity, Network Security, Cyber Attacks, Cyber Security Strategy, Cyber Operations, Authorization (Computing), Security Controls, Network Monitoring, Data Security, Identity and Access Management

  • Macquarie University

    Skills you'll gain: DevSecOps, Secure Coding, Application Security, IT Security Architecture, DevOps, Security Engineering, Security Controls, CI/CD, Cybersecurity, Cyber Security Strategy, Cloud Security, Infrastructure as Code (IaC), Cloud Platforms, Vulnerability Management, Development Environment, Cloud Computing, Cloud Infrastructure, Cloud Computing Architecture, User Story, Backlogs

What brings you to Coursera today?

  • Skills you'll gain: Digital Forensics, Investigation, Cybersecurity, Data Integrity, Criminal Investigation and Forensics, Data Ethics, Computer Security, Scenario Testing, Litigation Support, Record Keeping, Technical Writing, Incident Response, Digital Analysis, Writing, Technical Documentation, File Systems, Artifactory, Microsoft Windows

  • Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cybersecurity, Cyber Attacks, Digital Forensics

  • Skills you'll gain: Incident Response, Digital Forensics, Distributed Denial-Of-Service (DDoS) Attacks, Security Information and Event Management (SIEM), Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Continuous Monitoring, Event Monitoring, Endpoint Security, Cyber Threat Intelligence, Anomaly Detection, Cybersecurity, Security Controls, Cyber Security Strategy, Threat Detection, Cyber Attacks, Litigation Support, Digital Analysis, Cyber Engineering

  • Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Security Strategy, IT Security Architecture, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cyber Security Assessment, Network Security, Application Security, DevSecOps, Malware Protection, Security Management, Cloud Security, Encryption, Authentications

  • Skills you'll gain: Digital Forensics, File Systems, Microsoft Windows, grep, TCP/IP, Network Protocols, Data Security, File Management, Operating Systems, Data Structures, General Networking, Data Validation, File I/O, Record Keeping, Data Integrity, Data Storage, User Accounts, USB, Ethical Standards And Conduct, System Configuration

  • Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Threat Management, Cybersecurity, Computer Security Incident Management, IT Security Architecture, Cloud Security, Security Architecture Review, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Risk Management