More to explore:

All Results

  • Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security, Computer Security Awareness Training, Cyber Security Strategy, Security Awareness, Threat Management, Network Security, Information Privacy, Malware Protection, Email Security, Mitigation

  • Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning

  • Skills you'll gain: Interviewing Skills, Verbal Communication Skills, Cybersecurity, Communication Strategies, Communication, Professional Development, Penetration Testing, Personal Attributes, Stress Management, Branding, Adaptability, Collaboration, Negotiation, Digital Forensics

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Security Testing, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Linux, Linux Administration

  • Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Network Analysis

  • Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Vulnerability Management, Development Environment, Security Controls, DevOps, Data Security, Software Development Life Cycle

What brings you to Coursera today?

  • Skills you'll gain: Metasploit, Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Cyber Operations, Malware Protection, Network Protocols, Security Testing, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP)

  • Total Seminars

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Metasploit, Vulnerability Assessments, Exploitation techniques, Cyber Security Assessment, Exploit development, Network Security, Cybersecurity, Vulnerability Management, Brute-force attacks, Security Testing, MITRE ATT&CK Framework, Test Planning, Cloud Security, Network Analysis, OSI Models, Linux, Web Applications, Ethical Standards And Conduct

  • Skills you'll gain: Penetration Testing, Security Testing, Hardening, Test Script Development, Brute-force attacks, Business Logic, Cloud Security, Network Analysis, Programming Principles, API Testing, General Data Protection Regulation (GDPR), Cloud Computing, Wireless Networks, Data Persistence, Application Programming Interface (API), Data Security

  • Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, System Configuration, Digital Forensics

  • Skills you'll gain: Security Testing, Cloud Security, Cyber Security Assessment, Penetration Testing, Microsoft Azure, Exploitation techniques, Security Controls, Azure Active Directory, Brute-force attacks, Email Security, Cloud Storage, Authentications, User Accounts, Identity and Access Management

  • Skills you'll gain: Vulnerability Scanning, Metasploit, Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Network Security, Vulnerability Management, Brute-force attacks, Exploitation techniques, Network Monitoring, Network Troubleshooting, Security Engineering, Network Analysis, Wireless Networks, Network Protocols, Data Manipulation