More to explore:

All Results

  • University of Colorado System

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Identity and Access Management, Cloud Computing, User Provisioning, Security Controls, Cloud Management, Malware Protection, Cloud Infrastructure, Cloud Security, Security Engineering, Authorization (Computing), Network Security, Hardening, Cryptographic Protocols, Cybersecurity

  • Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Incident Management, Security Architecture Review, Application Security, Identity and Access Management, Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Security Strategy, Systems Architecture, Security Management, Security Engineering, Zero Trust Network Access, Security Awareness, Risk Management Framework, Cybersecurity, Enterprise Architecture

  • Skills you'll gain: Open Web Application Security Project (OWASP), SonarQube, Threat Modeling, Secure Coding, Application Security, Security Testing, DevSecOps, Code Review, Maintainability, Vulnerability Scanning, Software Quality (SQA/SQC), Risk Mitigation, Software Quality Assurance, MITRE ATT&CK Framework, Cyber Security Assessment, Vulnerability Assessments, Software Technical Review, Continuous Integration, Vulnerability Management, Cyber Attacks

  • Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cryptography, Cyber Security Strategy, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cybersecurity, IT Security Architecture, Encryption, Information Systems Security, Vulnerability Assessments, Cyber Attacks, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management

  • Skills you'll gain: IT Security Architecture, Incident Response, Computer Security Incident Management, Zero Trust Network Access, Cloud Computing Architecture, Authentications, Endpoint Detection and Response, Risk Analysis, Network Security, Compliance Training, Risk Mitigation, Risk Management Framework, Cyber Governance, Regulatory Compliance, Cloud Computing, Data Security, Application Security, Cyber Risk, Information Systems Security, Risk Management

  • Skills you'll gain: Threat Modeling, Secure Coding, Application Security, DevSecOps, Open Web Application Security Project (OWASP), Cybersecurity, Security Testing, Mobile Security, Software Development Life Cycle, Cryptographic Protocols, Security Controls, Computer Security, Vulnerability Assessments, Continuous Monitoring, Vulnerability Management, Computer Programming, C and C++, Java Programming, Python Programming, C (Programming Language)

What brings you to Coursera today?

  • Skills you'll gain: Secure Coding, Application Security, Security Testing, Software Development Methodologies, Configuration Management, Software Development, Software Configuration Management, Systems Development Life Cycle, Software Development Life Cycle, Package and Software Management, Software Testing, Security Engineering, API Testing, Application Programming Interface (API), Cloud Security, Process Driven Development, Risk Management Framework

  • University of Colorado System

    Skills you'll gain: Database Design, Software Design, Application Security, User Experience Design, Vulnerability Assessments, Database Theory, Unified Modeling Language, Unit Testing, Usability, UI/UX Research, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Data Flow Diagrams (DFDs), Relational Databases, Software Visualization, Security Software, Systems Development Life Cycle, Software Development Life Cycle

  • Skills you'll gain: AI Security, Retrieval-Augmented Generation, AI Orchestration, Responsible AI, LangChain, Threat Modeling, LLM Application, Generative AI, Vector Databases, Embeddings, Application Security, Large Language Modeling, Open Web Application Security Project (OWASP), Security Testing, Security Controls, Prompt Engineering, MITRE ATT&CK Framework

  • Skills you'll gain: Data Integrity, Spreadsheet Software, Microsoft Excel, Data Entry, Excel Formulas, Google Sheets, Collaborative Software, Audit Working Papers, Security Controls, Data Security, Financial Modeling

  • Skills you'll gain: Computer Security Incident Management, Vulnerability Management, Cyber Security Strategy, Cyber Governance, Incident Response, Cyber Operations, Cyber Threat Intelligence, Encryption, Cyber Attacks, Governance Risk Management and Compliance, Incident Management, Cryptographic Protocols, Threat Detection, Security Strategy, Mobile Security, Network Model, Vulnerability, Security Awareness, Vulnerability Assessments, Vulnerability Scanning

  • Skills you'll gain: Zero Trust Network Access, Cybersecurity, Cyber Security Strategy, Cyber Security Assessment, IT Security Architecture, Computer Security, Security Architecture Review, Network Security, Security Strategy, Cloud Standards, Cloud Security