More to explore:

All Results

  • Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Network Security, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis

  • Skills you'll gain: Threat Modeling, Network Security, Threat Management, Vulnerability Management, Intrusion Detection and Prevention, Hardening, Computer Security Incident Management, Security Management, Cyber Threat Intelligence, Security Awareness, Incident Response, Cybersecurity, Network Protocols, Endpoint Detection and Response, Bash (Scripting Language), Debugging, Linux, Web Presence, Python Programming, SQL

  • Kennesaw State University

    Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Threat Management, Security Controls, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Human Factors (Security)

  • Skills you'll gain: Email Security, Cybersecurity, Hardening, Authorization (Computing), Cyber Attacks, Security Awareness, Security Controls, Threat Management, Encryption, Data Security, Identity and Access Management, Authentications, Application Security, Endpoint Security, Threat Detection, Cryptography, Malware Protection, Patch Management, Multi-Factor Authentication

  • Skills you'll gain: Email Security, Public Key Infrastructure, Encryption, Cryptography, IT Security Architecture, Network Security, Cybersecurity, Hardening, Endpoint Detection and Response, Data Security, Cryptographic Protocols, Network Architecture, Advanced Encryption Standard (AES), Key Management, Authorization (Computing), Cyber Attacks, Information Technology, Cyber Security Strategy, Penetration Testing, Computer Security Incident Management

What brings you to Coursera today?

  • Skills you'll gain: Threat Detection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Cyber Attacks, Cyber Operations, Endpoint Detection and Response, Threat Management, Incident Management, Zero Trust Network Access, MITRE ATT&CK Framework, Security Management, Cyber Security Policies, Security Awareness, Security Information and Event Management (SIEM), Human Factors (Security), Security Controls, Endpoint Security, General Data Protection Regulation (GDPR)

  • Skills you'll gain: IT Security Architecture, Network Security, Cybersecurity, Endpoint Detection and Response, Data Security, Network Architecture, Application Security, Information Technology Architecture

  • Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Service Management, IT Management, Responsible AI, Compliance Auditing, Cyber Risk, Data Ethics, Cyber Governance, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Regulation and Legal Compliance, Compliance Management, Law, Regulation, and Compliance, Cyber Security Assessment, ISO/IEC 27001, Risk Management

  • Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Security Testing, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Vulnerability Scanning, Operating Systems, Cyber Risk, Cloud Services, Exploitation techniques, General Networking, Cyber Governance, Cyber Security Strategy

  • Macquarie University

    Skills you'll gain: Cyber Risk, Security Awareness, Cyber Attacks, Mobile Security, Cybersecurity, Cyber Security Assessment, Cyber Security Policies, Cyber Threat Hunting, Data Security, Security Strategy, Email Security, Authentications, Security Management

  • Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Linux, Linux Commands, Incident Response, Network Security, Cybersecurity, TCP/IP, Linux Administration, Network Protocols, Cloud Computing Architecture, Cloud Security, Cyber Attacks