All Results

Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Network Security, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis

Google
Skills you'll gain: Threat Modeling, Network Security, Threat Management, Vulnerability Management, Intrusion Detection and Prevention, Hardening, Computer Security Incident Management, Security Management, Cyber Threat Intelligence, Security Awareness, Incident Response, Cybersecurity, Network Protocols, Endpoint Detection and Response, Bash (Scripting Language), Debugging, Linux, Web Presence, Python Programming, SQL

Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Threat Management, Security Controls, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Human Factors (Security)

Skills you'll gain: Email Security, Cybersecurity, Hardening, Authorization (Computing), Cyber Attacks, Security Awareness, Security Controls, Threat Management, Encryption, Data Security, Identity and Access Management, Authentications, Application Security, Endpoint Security, Threat Detection, Cryptography, Malware Protection, Patch Management, Multi-Factor Authentication

Skills you'll gain: Email Security, Public Key Infrastructure, Encryption, Cryptography, IT Security Architecture, Network Security, Cybersecurity, Hardening, Endpoint Detection and Response, Data Security, Cryptographic Protocols, Network Architecture, Advanced Encryption Standard (AES), Key Management, Authorization (Computing), Cyber Attacks, Information Technology, Cyber Security Strategy, Penetration Testing, Computer Security Incident Management
What brings you to Coursera today?

Starweaver
Skills you'll gain: Threat Detection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Cyber Attacks, Cyber Operations, Endpoint Detection and Response, Threat Management, Incident Management, Zero Trust Network Access, MITRE ATT&CK Framework, Security Management, Cyber Security Policies, Security Awareness, Security Information and Event Management (SIEM), Human Factors (Security), Security Controls, Endpoint Security, General Data Protection Regulation (GDPR)

Skills you'll gain: IT Security Architecture, Network Security, Cybersecurity, Endpoint Detection and Response, Data Security, Network Architecture, Application Security, Information Technology Architecture

Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Service Management, IT Management, Responsible AI, Compliance Auditing, Cyber Risk, Data Ethics, Cyber Governance, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Regulation and Legal Compliance, Compliance Management, Law, Regulation, and Compliance, Cyber Security Assessment, ISO/IEC 27001, Risk Management

Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Security Testing, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Vulnerability Scanning, Operating Systems, Cyber Risk, Cloud Services, Exploitation techniques, General Networking, Cyber Governance, Cyber Security Strategy

Macquarie University
Skills you'll gain: Cyber Risk, Security Awareness, Cyber Attacks, Mobile Security, Cybersecurity, Cyber Security Assessment, Cyber Security Policies, Cyber Threat Hunting, Data Security, Security Strategy, Email Security, Authentications, Security Management

Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Linux, Linux Commands, Incident Response, Network Security, Cybersecurity, TCP/IP, Linux Administration, Network Protocols, Cloud Computing Architecture, Cloud Security, Cyber Attacks
