All Results

Skills you'll gain: Threat Detection, Cyber Security Strategy, Cyber Threat Intelligence, Cybersecurity, Spatial Analysis, Interactive Data Visualization, Geospatial Information and Technology, Web Scraping, Penetration Testing, Digital Forensics, IT Automation, Data Security, Security Awareness, Personally Identifiable Information, Network Security, Scripting, Network Analysis, Open Source Technology, Information Privacy

Skills you'll gain: Prompt Engineering, ChatGPT, Security Testing, Exploit development, Responsible AI, API Testing, AI Integrations, Data Ethics, Penetration Testing, OpenAI, Exploitation techniques, Vulnerability Scanning, Generative AI

Johns Hopkins University
Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Fraud detection, Model Evaluation, Malware Protection, Cybersecurity, Threat Detection, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Classification Algorithms, Email Security, Network Security, Jupyter, Authentications, Machine Learning Methods, Machine Learning Algorithms, Artificial Intelligence

Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Security Strategy, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Security Testing, IT Security Architecture, Cyber Attacks, Security Information and Event Management (SIEM), Cyber Engineering, Patch Management, Network Security, Malware Protection, Security Management, Digital Forensics, Risk Analysis

Skills you'll gain: Digital Forensics, Incident Response, Computer Security Incident Management, Threat Detection, Incident Management, Cyber Threat Intelligence, Cybersecurity, Security Management, Data Integrity

Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Cybersecurity, Data Preprocessing, Data Management, Data Quality, Technical Communication, Automation, Requirements Analysis
What brings you to Coursera today?

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Model Evaluation, Incident Response, Threat Detection, Computer Security Incident Management, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Incident Management, Threat Management, Model Training, Continuous Monitoring, Cyber Security Policies, System Monitoring, AI Security, Virtual Machines, Network Security, Machine Learning Methods, Network Analysis, Data Analysis

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness

Skills you'll gain: Security Information and Event Management (SIEM), Role-Based Access Control (RBAC), Dashboard Creation, Threat Detection, Incident Response, Data Import/Export, Identity and Access Management, Computer Security Incident Management, Data Integration, Data Modeling

Skills you'll gain: Penetration Testing, Metasploit, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cyber Threat Intelligence, Generative AI, Security Testing, Responsible AI, AI Integrations

Erasmus University Rotterdam
Skills you'll gain: Security Management, Threat Management, Intelligence Collection and Analysis, International Relations, Public Safety and National Security, Security Awareness, Safety and Security, Risk Management, Cybersecurity, Cyber Threat Intelligence, Governance, Cultural Diversity, Economics, Policy, and Social Studies

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning