All Results

Skills you'll gain: Security Information and Event Management (SIEM), Role-Based Access Control (RBAC), Dashboard Creation, Threat Detection, Incident Response, Data Import/Export, Identity and Access Management, Computer Security Incident Management, Data Integration, Data Modeling

Skills you'll gain: Incident Response, Hybrid Cloud Computing, Zero Trust Network Access, Incident Management, Computer Security Incident Management, Security Information and Event Management (SIEM), Endpoint Detection and Response, Containerization, Event Monitoring, Enterprise Security, Telecommunications, Cybersecurity, Threat Detection, Security Controls, Network Security, Network Architecture

Skills you'll gain: Cyber Threat Intelligence, Threat Modeling, MITRE ATT&CK Framework, Threat Detection, Threat Management, Intelligence Collection and Analysis, Report Writing, Technical Communication, Cyber Security Strategy, Cybersecurity, Research Reports, Data Storytelling, Oral Expression, Verbal Communication Skills, Incident Response, Risk Analysis, Communication, Infrastructure Security, Analysis, Stakeholder Communications

Skills you'll gain: Splunk, Security Information and Event Management (SIEM), Data Modeling, Role-Based Access Control (RBAC), Dashboard Creation, System Monitoring, Dashboard, Model Training, Incident Response, Computer Security Incident Management, Threat Detection, User Accounts, Machine Learning Methods, Data Transformation, Applied Machine Learning, User Provisioning, Cybersecurity, Interactive Data Visualization, Event Monitoring, Data Manipulation

Skills you'll gain: Virtual Machines, Debugging, System Programming, Windows PowerShell, Virtual Environment, Virtualization, Programming Principles, Excel Macros, Linux

Skills you'll gain: Network Security, Virtual Private Networks (VPN), Authentications, Firewall, Authorization (Computing), Computer Security, Remote Access Systems, Cybersecurity, General Networking, Network Monitoring, Security Controls, IT Automation, Software-Defined Networking, Wireless Networks, Dynamic Host Configuration Protocol (DHCP), Virtual Local Area Network (VLAN), Automation, Network Routing, Encryption, Application Programming Interface (API)
What brings you to Coursera today?

Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Exploitation techniques, Brute-force attacks, Scripting, Network Protocols, Authentications, Scripting Languages, Python Programming, Data Access, Identity and Access Management, Automation

Skills you'll gain: AI Security, Cyber Threat Intelligence, DevSecOps, Security Information and Event Management (SIEM), AI Integrations, Agentic Workflows, Cybersecurity, Cyber Security Assessment, AI Personalization, Threat Detection, AI Workflows, Model Deployment, Incident Response, ChatGPT, OpenAI, Malware Protection, Cloud Security

Infosec
Skills you'll gain: MITRE ATT&CK Framework, Threat Detection, Cybersecurity, Network Security, Cyber Security Strategy, System Monitoring, Cyber Operations, Threat Management, Continuous Monitoring, Exploitation techniques, Penetration Testing, Cyber Attacks, Data Persistence, Scripting, IT Automation, Network Monitoring, Persistence, Python Programming, Data Access, Computer Programming

LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Vulnerability Scanning, Kubernetes, Cloud Infrastructure, Cyber Security Strategy, Email Security, Virtualization, SQL

LearnKartS
Skills you'll gain: Security Awareness, Information Systems Security, Cybersecurity, Cyber Security Strategy, Cyber Security Policies, Information Privacy, Data Sharing, Telecommuting, Professional Development

Skills you'll gain: Threat Detection, Cyber Security Strategy, Cyber Threat Intelligence, Cybersecurity, Spatial Analysis, Interactive Data Visualization, Geospatial Information and Technology, Web Scraping, Penetration Testing, Digital Forensics, IT Automation, Data Security, Security Awareness, Personally Identifiable Information, Network Security, Scripting, Network Analysis, Open Source Technology, Information Privacy