More to explore:

All Results

  • Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Network Analysis

  • Skills you'll gain: Open Web Application Security Project (OWASP), AI Security, Vulnerability Assessments, Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

  • Skills you'll gain: Metasploit, Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Cyber Operations, Malware Protection, Network Protocols, Security Testing, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP)

  • Skills you'll gain: Business Ethics, Ethical Standards And Conduct, Decision Making, Strategic Decision-Making, Case Studies, Corporate Sustainability, Social Impact, Conflict Management, Team Leadership

  • Johns Hopkins University

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Cryptography, Mobile Security, Cryptographic Protocols, Security Testing, Vulnerability Scanning, Cyber Security Assessment, Application Security, Operating System Administration, Network Security, Operating Systems, Encryption, Hardening

  • Skills you'll gain: Courage, Professionalism, Personal Integrity, Risk Analysis, Professional Development, Leadership, Culture Transformation, Culture

What brings you to Coursera today?

  • Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Network Security, Cryptography, Threat Management, Information Systems Security, Threat Detection, Cloud Security

  • Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Security Testing, Network Security, Cyber Security Assessment, Cybersecurity, Cloud Computing, Cyber Attacks, Brute-force attacks, Exploitation techniques, Human Factors (Security), Web Applications, Mobile Security, Internet Of Things, Wireless Networks

  • Skills you'll gain: Courage, Ethical Standards And Conduct, Decision Making, Business Ethics, Leadership Studies, Professionalism, Engineering Management, Personal Integrity, Leadership

  • Skills you'll gain: Research, Intellectual Property, Ethical Standards And Conduct, Higher Education, Social Justice, Data Management, Mentorship

  • The University of Notre Dame

    Skills you'll gain: Active Listening, Workplace inclusivity, Data Ethics, Negotiation, Leadership Studies, Leadership Development, Business Ethics, Conflict Management, Change Management, Organizational Change, Diversity and Inclusion, Social Justice, Tactfulness, Communication Strategies, Leadership, Personal Integrity, Analytics, Analytical Skills, Market Dynamics, Ethical Standards And Conduct

  • Check Point Software Technologies Ltd.

    Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Security Policies, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Infrastructure Architecture, Communication Systems, Package and Software Management, Linux, Software Versioning