More to explore:

All Results

  • Skills you'll gain: Vulnerability Scanning, Metasploit, Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Network Security, Vulnerability Management, Brute-force attacks, Exploitation techniques, Network Monitoring, Network Troubleshooting, Security Engineering, Network Analysis, Wireless Networks, Network Protocols, Data Manipulation

  • Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Security Testing, Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Cyber Engineering, Cyber Governance, Risk Management Framework, Linux Administration, Dashboard Creation, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers

  • Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Security Testing, Network Security, Threat Detection, Network Monitoring, Network Analysis, Operating Systems

  • Skills you'll gain: Cyber Threat Intelligence, Cyber Operations, Cyber Threat Hunting, Threat Modeling, Cybersecurity, Cyber Security Strategy, Network Security, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Cyber Attacks, Linux Commands, Linux, Cyber Engineering, Network Administration, Operating System Administration, Hardening, Network Monitoring, Exploitation techniques, Security Awareness, Operating Systems

  • Skills you'll gain: Open Web Application Security Project (OWASP), SonarQube, Threat Modeling, Secure Coding, Application Security, Security Testing, DevSecOps, Code Review, Maintainability, Vulnerability Scanning, Software Quality (SQA/SQC), Risk Mitigation, Software Quality Assurance, MITRE ATT&CK Framework, Vulnerability Assessments, Cyber Security Assessment, Software Technical Review, Continuous Integration, Vulnerability Management, Cyber Attacks

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Cyber Security Strategy, Security Testing, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Linux, Linux Administration

What brings you to Coursera today?

  • Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Vulnerability Management, Development Environment, Security Controls, DevOps, Data Security, Software Development Life Cycle

  • Total Seminars

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Metasploit, Vulnerability Assessments, Exploitation techniques, Cyber Security Assessment, Exploit development, Network Security, Cybersecurity, Vulnerability Management, Brute-force attacks, Security Testing, MITRE ATT&CK Framework, Test Planning, Cloud Security, Network Analysis, OSI Models, Linux, Web Applications, Ethical Standards And Conduct

  • Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning

  • Skills you'll gain: Penetration Testing, Record Keeping, Vulnerability Scanning, Security Testing, Data Management, Cloud Management, Threat Management, Cyber Security Assessment, Records Management, Cloud Computing Architecture, Authentications, Firewall, Cyber Attacks, Cybersecurity, Cyber Threat Intelligence, Authorization (Computing), Generative Adversarial Networks (GANs), Active Directory, Data Ethics, AI Security

  • Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Application Security, Vulnerability Scanning, Risk Mitigation, Cyber Security Assessment, Vulnerability Management, Cyber Attacks, Security Engineering, Risk Analysis, Web Applications, Security Awareness, Computer Security, Security Management, Cyber Security Strategy, Authentications, Software Development, Linux, Linux Commands

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Vulnerability Scanning, Kubernetes, Cloud Infrastructure, Cyber Security Strategy, Email Security, Virtualization, SQL