More to explore:

All Results

  • Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cryptography, Cyber Security Strategy, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cybersecurity, IT Security Architecture, Encryption, Information Systems Security, Vulnerability Assessments, Cyber Attacks, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management

  • Skills you'll gain: Azure Active Directory, Data Security, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Cloud Security, Active Directory, Threat Modeling, Security Strategy, Authentications, Data Storage, Application Security, Database Architecture and Administration, IT Security Architecture, Virtual Machines, Microsoft SQL Servers, Infrastructure Security, Kubernetes, Continuous Monitoring, Web Applications

  • Skills you'll gain: IT Security Architecture, Incident Response, Computer Security Incident Management, Zero Trust Network Access, Cloud Computing Architecture, Authentications, Endpoint Detection and Response, Risk Analysis, Network Security, Compliance Training, Risk Mitigation, Risk Management Framework, Cyber Governance, Regulatory Compliance, Cloud Computing, Data Security, Application Security, Cyber Risk, Information Systems Security, Risk Management

  • Logical Operations

    Skills you'll gain: Microsoft Windows, Microsoft Copilot, Cloud Applications, File Management, System Configuration, Patch Management, Document Management, Cloud Storage, Cloud-Based Integration, Peripheral Devices, Operating System Administration, Operating Systems, Software Installation, Web Applications, Security Awareness, Information Systems Security, Artificial Intelligence, Control Panels, AI Enablement, User Interface (UI)

  • Skills you'll gain: Windows PowerShell, Active Directory, Scripting, IT Automation, Network Monitoring, Scripting Languages, Microsoft Windows, Windows Servers, Shell Script, User Accounts, Microsoft Servers, Command-Line Interface, Network Administration, Remote Access Systems, Servers, Systems Administration, User Interface (UI), UI Components, Server Administration, Authentications

  • Skills you'll gain: Penetration Testing, Record Keeping, Vulnerability Scanning, Security Testing, Data Management, Cloud Management, Threat Management, Cyber Security Assessment, Records Management, Cloud Computing Architecture, Authentications, Firewall, Cyber Attacks, Cybersecurity, Cyber Threat Intelligence, Authorization (Computing), Generative Adversarial Networks (GANs), Active Directory, Data Ethics, AI Security

What brings you to Coursera today?

  • University of Colorado System

    Skills you'll gain: Windows Servers, Authorization (Computing), Microsoft Windows, Authentications, Operating System Administration, User Accounts, Group Policy, User Provisioning, Microsoft Servers, Security Controls, Enterprise Security, Active Directory, Identity and Access Management, Software Installation, Server Administration, Encryption, Network Planning And Design, Network Performance Management, Computer Networking

  • Skills you'll gain: Azure Active Directory, Role-Based Access Control (RBAC), Microsoft 365, Microsoft Azure, Identity and Access Management, Single Sign-On (SSO), User Provisioning, Multi-Tenant Cloud Environments, Active Directory, Multi-Factor Authentication, Cloud Security, Zero Trust Network Access, Risk Management Framework, Event Monitoring, IT Security Architecture, Authentications, Security Engineering

  • Skills you'll gain: Identity and Access Management, AWS Identity and Access Management (IAM), Authentications, Azure Active Directory, Okta, Cybersecurity, Security Management, Data Security, Cloud Security

  • Skills you'll gain: Security Testing, Cloud Security, Cyber Security Assessment, Penetration Testing, Microsoft Azure, Exploitation techniques, Security Controls, Azure Active Directory, Brute-force attacks, Email Security, Cloud Storage, Authentications, User Accounts, Identity and Access Management