More to explore:

All Results

  • Skills you'll gain: Digital Forensics, grep, TCP/IP, Network Protocols, Data Security, General Networking, Record Keeping, Data Integrity, File Management, Ethical Standards And Conduct, Encryption, Algorithms

  • Skills you'll gain: Digital Forensics, File Systems, Microsoft Windows, grep, TCP/IP, Network Protocols, Data Security, File Management, Operating Systems, Data Structures, General Networking, Data Validation, File I/O, Record Keeping, Data Integrity, Data Storage, User Accounts, USB, Ethical Standards And Conduct, System Configuration

  • Skills you'll gain: Digital Forensics, Malware Protection, Cybersecurity, Cyber Attacks, Network Security, Data Integrity, Network Analysis, Microsoft Windows, Mac OS, Linux Commands, Web Applications, File Systems

  • Skills you'll gain: Digital Forensics, Incident Response, Computer Security Incident Management, Threat Detection, Incident Management, Cyber Threat Intelligence, Cybersecurity, Security Management, Data Integrity

  • Birla Institute of Technology & Science, Pilani

    Skills you'll gain: Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Cryptographic Protocols, Encryption, Authentications, Data Encryption Standard, Advanced Encryption Standard (AES), Key Management, Network Protocols, Email Security, Cybersecurity, Network Security, Security Software, Data Integrity, Multi-Factor Authentication, Firewall

  • Skills you'll gain: Digital Forensics, Cybersecurity, Malware Protection, Data Security, Network Security, Event Monitoring, Threat Detection, Network Analysis, Operating Systems, Data Integrity, Microsoft Windows, Mac OS, File Systems, Linux, Linux Commands, Web Applications

What brings you to Coursera today?

  • Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness

  • Skills you'll gain: Digital Forensics, Investigation, Cybersecurity, Data Integrity, Criminal Investigation and Forensics, Data Ethics, Computer Security, Scenario Testing, Litigation Support, Record Keeping, Technical Writing, Incident Response, Digital Analysis, Writing, Technical Documentation, File Systems, Artifactory, Microsoft Windows

  • Skills you'll gain: Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Network Protocols, Network Analysis, Network Monitoring, Image Analysis, Virtual Machines, Virtualization and Virtual Machines, Virtual Environment, Open Source Technology, Malware Protection, Command-Line Interface, Software Installation, File Management, Microsoft Windows

  • Universitat Politècnica de València

    Skills you'll gain: Cybersecurity, Cyber Attacks, Computer Security Awareness Training, Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Security Awareness, Data Security, Personally Identifiable Information, Cyber Risk, Malware Protection, Cryptography, General Data Protection Regulation (GDPR), Exploitation techniques, Information Privacy, Human Factors (Security), Multi-Factor Authentication, Authentications

  • IIMA - IIM Ahmedabad

    Skills you'll gain: Digital Transformation, Business Transformation, Stakeholder Engagement, AI Enablement, Innovation, Stakeholder Management, Organizational Change, Change Management, Business Modeling, Technology Strategies, Organizational Strategy, Artificial Intelligence, Enterprise Architecture, Organizational Development, digital literacy, Organizational Effectiveness, Information Technology Architecture, Performance Improvement, Cloud Computing Architecture, Governance

  • Skills you'll gain: Mobile Security, Digital Forensics, Criminal Investigation and Forensics, Cyber Threat Intelligence, Cyber Security Strategy, Investigation, Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Mobile Development, Cyber Security Policies, Model Training, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Data Security, Cyber Governance, Endpoint Security, Machine Learning Methods, iOS Development, Application Security