All Results

Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Network Analysis

Skills you'll gain: Open Web Application Security Project (OWASP), AI Security, Vulnerability Assessments, Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

Skills you'll gain: Metasploit, Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Cyber Operations, Malware Protection, Network Protocols, Security Testing, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP)

Skills you'll gain: Business Ethics, Ethical Standards And Conduct, Decision Making, Strategic Decision-Making, Case Studies, Corporate Sustainability, Social Impact, Conflict Management, Team Leadership

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Cryptography, Mobile Security, Cryptographic Protocols, Security Testing, Vulnerability Scanning, Cyber Security Assessment, Application Security, Operating System Administration, Network Security, Operating Systems, Encryption, Hardening

LearnKartS
Skills you'll gain: Courage, Professionalism, Personal Integrity, Risk Analysis, Professional Development, Leadership, Culture Transformation, Culture
What brings you to Coursera today?

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Network Security, Cryptography, Threat Management, Information Systems Security, Threat Detection, Cloud Security

EC-Council
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Security Testing, Network Security, Cyber Security Assessment, Cybersecurity, Cloud Computing, Cyber Attacks, Brute-force attacks, Exploitation techniques, Human Factors (Security), Web Applications, Mobile Security, Internet Of Things, Wireless Networks

University of Colorado Boulder
Skills you'll gain: Courage, Ethical Standards And Conduct, Decision Making, Business Ethics, Leadership Studies, Professionalism, Engineering Management, Personal Integrity, Leadership

Utrecht University
Skills you'll gain: Research, Intellectual Property, Ethical Standards And Conduct, Higher Education, Social Justice, Data Management, Mentorship

The University of Notre Dame
Skills you'll gain: Active Listening, Workplace inclusivity, Data Ethics, Negotiation, Leadership Studies, Leadership Development, Business Ethics, Conflict Management, Change Management, Organizational Change, Diversity and Inclusion, Social Justice, Tactfulness, Communication Strategies, Leadership, Personal Integrity, Analytics, Analytical Skills, Market Dynamics, Ethical Standards And Conduct

Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Security Policies, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Infrastructure Architecture, Communication Systems, Package and Software Management, Linux, Software Versioning