More to explore:

All Results

  • Skills you'll gain: Oil and Gas, Petroleum Industry, Hazard Analysis, Safety Standards, Environmental Resource Management, Energy and Utilities, Safety Assurance, Safety Training, Environment and Resource Management, Environmental Regulations, Environment Health And Safety, Environmental Science, Environmental Engineering and Restoration, Big Data, Plant Operations and Management, Process Engineering, Chemical Engineering, Environmental Engineering, Data Management, Environmental Issue

  • Skills you'll gain: LangChain, LLM Application, Prompt Engineering, API Design, MLOps (Machine Learning Operations), Large Language Modeling, Performance Tuning, Microservices, Application Deployment, Kubernetes, Scalability, Site Reliability Engineering, DevOps, CI/CD, Docker (Software), Python Programming, Containerization, System Monitoring, Cloud Platforms, Security Controls

  • Skills you'll gain: Restful API, Object Oriented Programming (OOP), Object Oriented Design, Java Programming, Spring Framework, Java, Spring Boot, API Design, Application Programming Interface (API), Hibernate (Java), Data Validation, Development Testing, Verification And Validation, Authentications, Model View Controller, Back-End Web Development, Computer Programming, Code Reusability, Object-Relational Mapping, Server Side

  • Skills you'll gain: Metasploit, Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Cyber Operations, Malware Protection, Network Protocols, Security Testing, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP)

  • Skills you'll gain: Angular, Application Deployment, JavaScript Frameworks, Software Testing, Test Tools, Web Development Tools, Unit Testing, Application Performance Management, CI/CD, Continuous Integration, Web Applications, TypeScript, Ajax, Application Lifecycle Management, Secure Coding, Web Development, Code Coverage, Software Architecture, Command-Line Interface, Version Control

What brings you to Coursera today?

  • Skills you'll gain: Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Application Security, Authorization (Computing), Authentications, Data Validation, Encryption, Security Software, Security Controls, Data Security, Vulnerability Scanning, Endpoint Security, Role-Based Access Control (RBAC), Intrusion Detection and Prevention, Security Awareness, Cybersecurity, Configuration Management, Package and Software Management, Web Applications, Web Development Tools

  • Skills you'll gain: Threat Modeling, Data Loss Prevention, Mobile Security, DevSecOps, MLOps (Machine Learning Operations), Vulnerability Scanning, Model Optimization, Incident Response, LLM Application, Hardening, Application Security, Anomaly Detection, Responsible AI, Security Controls, Data Security, CI/CD, Infrastructure Security, Continuous Monitoring, Penetration Testing, Vulnerability Assessments

  • Skills you'll gain: AI Security, Large Language Modeling, LLM Application, Cybersecurity, Prompt Engineering, Threat Modeling, Cyber Security Assessment, Application Security, Vulnerability Assessments, Security Testing, Network Security, Exploitation techniques

  • Skills you'll gain: Threat Modeling, Secure Coding, Application Security, Security Testing, DevSecOps, MITRE ATT&CK Framework, Security Requirements Analysis, Authentications, Threat Detection, Software Development Life Cycle, Security Controls, Systems Development Life Cycle, Vulnerability Assessments, DevOps, Cyber Security Assessment, CI/CD, Linux, Cyber Security Strategy, Cyber Risk, Cyber Governance

  • Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Application Security, Vulnerability Scanning, Risk Mitigation, Cyber Security Assessment, Vulnerability Management, Cyber Attacks, Security Engineering, Risk Analysis, Web Applications, Security Awareness, Computer Security, Security Management, Cyber Security Strategy, Authentications, Software Development, Linux, Linux Commands