More to explore:

All Results

  • Skills you'll gain: Azure Active Directory, MITRE ATT&CK Framework, Threat Modeling, Penetration Testing, Zero Trust Network Access, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Record Keeping, Authentications, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Regulatory Requirements, Cloud Computing, Business Software, Active Directory, Computer Security Incident Management

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cyber Security Policies, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Cyber Threat Intelligence, Identity and Access Management, Network Security, Endpoint Detection and Response, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Intrusion Detection and Prevention, Event Management

  • Skills you'll gain: Threat Management, Microsoft Azure, Cloud Security, Threat Detection, Key Management, Security Controls, Data Security, Data Structures, Role-Based Access Control (RBAC), Continuous Monitoring, Event Monitoring, Query Languages

  • Skills you'll gain: Security Information and Event Management (SIEM), Azure Active Directory, Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cyber Attacks, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Firewall, Computer Security Incident Management, Endpoint Security, Cloud Standards, Threat Detection, Event Management

  • Skills you'll gain: Cyber Threat Hunting, Endpoint Detection and Response, Threat Detection, Incident Response, Cloud Security, Cyber Threat Intelligence, Computer Security Incident Management, Microsoft Azure, Security Information and Event Management (SIEM), Endpoint Security, Azure Active Directory, Incident Management, Security Controls, Multi-Cloud, Anomaly Detection, Email Security, Hybrid Cloud Computing, Role-Based Access Control (RBAC), Automation, Query Languages

What brings you to Coursera today?

  • Skills you'll gain: Linux Administration, Ubuntu, Lightweight Directory Access Protocols, File Systems, Linux, Virtualization and Virtual Machines, Linux Commands, Bash (Scripting Language), Linux Servers, Firewall, Virtual Machines, Package and Software Management, Virtualization, Remote Access Systems, File Management, Operating System Administration, Systems Administration, Shell Script, Containerization, Git (Version Control System)

  • Skills you'll gain: Lifting Ability, Clinical Practices, Injury Prevention, Mobility Assistance, Exercise Science, Train The Trainer, Physical Stamina, Safety Standards, Three-Phase, Mechanics

  • Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Endpoint Security, Microsoft Windows, Authentications, Application Deployment, Operating System Administration, Cyber Security Policies, Azure Active Directory, Group Policy, Enterprise Application Management, Identity and Access Management, Cloud Applications, Enterprise Security, Mobile Security, Endpoint Detection and Response, System Configuration, Security Management, User Provisioning, Android (Operating System), Patch Management

  • Skills you'll gain: Penetration Testing, Record Keeping, Vulnerability Scanning, Security Testing, Data Management, Cloud Management, Threat Management, Cyber Security Assessment, Records Management, Cloud Computing Architecture, Authentications, Firewall, Cyber Attacks, Cybersecurity, Cyber Threat Intelligence, Authorization (Computing), Generative Adversarial Networks (GANs), Active Directory, Data Ethics, AI Security

  • Skills you'll gain: Social Justice, Community Development, Conflict Management, Sustainable Development, Social and Human Services, Social Impact, International Relations, Social Work, Sociology, Advocacy, Creativity, Law, Regulation, and Compliance, Storytelling, Peer Review

  • Skills you'll gain: Digital Forensics, Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Security Testing, Cryptography, Security Controls, Cryptographic Protocols, Cyber Security Assessment, Cybersecurity, Authorization (Computing), Cloud Computing, Malware Protection, Cyber Attacks, Data Integrity