More to explore:

All Results

  • Skills you'll gain: Secure Coding, Authentications, Authorization (Computing), AI Integrations, Microsoft Copilot, Application Security, Data Validation, Web Applications, Data Security, Data Integrity

  • Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Exploitation techniques, Application Security, Vulnerability Assessments, Extensible Markup Language (XML), Threat Detection

  • Skills you'll gain: Open Web Application Security Project (OWASP), Exploitation techniques, Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Security Controls, Data Integrity, Continuous Monitoring, Secure Coding, System Monitoring, Patch Management, Identity and Access Management, Multi-Factor Authentication, Authorization (Computing), Cryptography, Extensible Markup Language (XML), System Configuration, Incident Response

  • Skills you'll gain: Terraform, AI Security, DevSecOps, Infrastructure as Code (IaC), Amazon Web Services, AWS CloudFormation, Amazon Elastic Compute Cloud, Cloud Security, Cloud Deployment, Firewall, Cloud Infrastructure, LLM Application, Application Deployment, Cloud Computing Architecture, Flask (Web Framework), Load Balancing, Analysis

  • Skills you'll gain: Email Security, Cybersecurity, Hardening, Authorization (Computing), Cyber Attacks, Security Awareness, Security Controls, Threat Management, Encryption, Data Security, Identity and Access Management, Authentications, Application Security, Endpoint Security, Threat Detection, Cryptography, Malware Protection, Patch Management, Multi-Factor Authentication

  • Skills you'll gain: Cyber Security Strategy, Incident Response, Cyber Governance, Incident Management, Security Strategy, Computer Security Incident Management, Risk Modeling, Risk Analysis, Cyber Security Policies, Governance Risk Management and Compliance, Cyber Threat Intelligence, Event Monitoring, Cyber Risk, Cybersecurity, Cyber Security Assessment, Governance, Compliance Management, Cyber Operations, Risk Management, Risk Control

What brings you to Coursera today?

  • Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Application Security, Vulnerability Scanning, Risk Mitigation, Cyber Security Assessment, Vulnerability Management, Cyber Attacks, Security Engineering, Risk Analysis, Web Applications, Security Awareness, Computer Security, Security Management, Cyber Security Strategy, Authentications, Software Development, Linux, Linux Commands

  • Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Security Testing, Network Security, Cyber Security Assessment, Cybersecurity, Cloud Computing, Cyber Attacks, Brute-force attacks, Exploitation techniques, Human Factors (Security), Web Applications, Mobile Security, Internet Of Things, Wireless Networks

  • Skills you'll gain: Secure Coding, Application Security, Exploitation techniques, Web Applications, Javascript, Web Development, Node.JS, Java Programming

  • University of London

    Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, ISO/IEC 27001, Threat Management, Risk Management Framework, Security Controls, Data Integrity

  • Kennesaw State University

    Skills you'll gain: Email Security, Wireless Networks, Mobile Security, Incident Response, Cybersecurity, Cyber Security Assessment, Personally Identifiable Information, Cyber Attacks, Firewall, General Networking, Threat Detection, Cyber Security Policies, Computer Security Awareness Training, Proxy Servers, Computer Security Incident Management, Network Security, Security Awareness, Threat Management, Cyber Risk, Social Media

  • Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Service Management, IT Management, Responsible AI, Compliance Auditing, Cyber Risk, Data Ethics, Cyber Governance, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Regulation and Legal Compliance, Compliance Management, Law, Regulation, and Compliance, Cyber Security Assessment, ISO/IEC 27001, Risk Management