More to explore:

All Results

  • Skills you'll gain: Computer Security Incident Management, NIST 800-53, Incident Management, Security Management, Digital Forensics, Security Controls, Disaster Recovery, Authorization (Computing), Continuous Monitoring, Change Control, Cybersecurity, Event Monitoring, Risk Management, System Monitoring, Federal Information Security Management Act, Cyber Risk, Threat Management, Cyber Security Policies, Vulnerability Assessments, Vulnerability Management

  • Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Service Management, IT Management, Responsible AI, Compliance Auditing, Cyber Risk, Data Ethics, Cyber Governance, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Regulation and Legal Compliance, Compliance Management, Law, Regulation, and Compliance, Cyber Security Assessment, ISO/IEC 27001, Risk Management

  • Skills you'll gain: Incident Response, Hybrid Cloud Computing, Zero Trust Network Access, Incident Management, Computer Security Incident Management, Security Information and Event Management (SIEM), Endpoint Detection and Response, Containerization, Event Monitoring, Enterprise Security, Telecommunications, Cybersecurity, Threat Detection, Security Controls, Network Security, Network Architecture

  • Skills you'll gain: Network Security, Incident Response, Incident Management, Business Continuity Planning, Business Continuity, Disaster Recovery, Security Controls, System Configuration, Configuration Management, Governance, Cyber Operations, Cybersecurity, Security Awareness, Security Management, Computer Security Incident Management, Cyber Attacks, Computer Security Awareness Training, Information Assurance, Data Security, Role-Based Access Control (RBAC)

  • Kennesaw State University

    Skills you'll gain: Email Security, Wireless Networks, Mobile Security, Incident Response, Cybersecurity, Cyber Security Assessment, Personally Identifiable Information, Cyber Attacks, Firewall, General Networking, Threat Detection, Cyber Security Policies, Computer Security Awareness Training, Proxy Servers, Computer Security Incident Management, Network Security, Security Awareness, Threat Management, Cyber Risk, Social Media

  • Skills you'll gain: Email Security, Public Key Infrastructure, Encryption, Cryptography, IT Security Architecture, Network Security, Cybersecurity, Hardening, Endpoint Detection and Response, Data Security, Cryptographic Protocols, Network Architecture, Advanced Encryption Standard (AES), Key Management, Authorization (Computing), Cyber Attacks, Information Technology, Cyber Security Strategy, Penetration Testing, Computer Security Incident Management

What brings you to Coursera today?

  • Status: Job Skills

    Skills you'll gain: Threat Modeling, Network Security, Threat Management, Vulnerability Management, Intrusion Detection and Prevention, Hardening, Computer Security Incident Management, Security Management, Cyber Threat Intelligence, Security Awareness, Incident Response, Cybersecurity, Network Protocols, Endpoint Detection and Response, Bash (Scripting Language), Debugging, Linux, Web Presence, Python Programming, SQL

  • Skills you'll gain: NIST 800-53, Risk Management Framework, Cyber Risk, Federal Information Security Management Act, Systems Development Life Cycle, Cybersecurity, Continuous Monitoring, Security Management, Cyber Governance, Cyber Security Strategy, Security Controls, Infrastructure Security, Cyber Security Assessment, Incident Response, Authorization (Computing), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Privacy, Personally Identifiable Information

  • Skills you'll gain: Digital Forensics, Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Security Testing, Cryptography, Security Controls, Cryptographic Protocols, Cyber Security Assessment, Cybersecurity, Authorization (Computing), Cloud Computing, Malware Protection, Cyber Attacks, Data Integrity

  • Skills you'll gain: Email Security, Cybersecurity, Hardening, Authorization (Computing), Cyber Attacks, Security Awareness, Security Controls, Threat Management, Encryption, Data Security, Identity and Access Management, Authentications, Application Security, Endpoint Security, Threat Detection, Cryptography, Malware Protection, Patch Management, Multi-Factor Authentication

  • Skills you'll gain: IT Security Architecture, Network Security, Cybersecurity, Endpoint Detection and Response, Data Security, Network Architecture, Application Security, Information Technology Architecture

  • Skills you'll gain: Network Security, Cloud Security, Cybersecurity, Cloud Deployment, Cloud Technologies, Network Administration, IT Security Architecture, Cloud Infrastructure, Firewall, Endpoint Detection and Response, Cloud Services, Computer Security, Network Infrastructure, Security Software, Data Security, AI Security, Docker (Software), Security Management, Software As A Service, Hybrid Cloud Computing