All Results

Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Security Strategy, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Security Testing, IT Security Architecture, Cyber Attacks, Security Information and Event Management (SIEM), Cyber Engineering, Patch Management, Network Security, Malware Protection, Security Management, Digital Forensics, Risk Analysis

Starweaver
Skills you'll gain: Cyber Threat Intelligence, Intelligence Collection and Analysis, Cyber Threat Hunting, MITRE ATT&CK Framework, Threat Modeling, Threat Detection, Threat Management, AI Security, Responsible AI, Malware Protection, Cybersecurity, Requirements Analysis, Technical Communication

Skills you'll gain: Cyber Threat Intelligence, Threat Management, Cybersecurity, Cyber Attacks, Data Preprocessing, Data Quality, Technical Communication, Automation, Requirements Analysis, Artificial Intelligence

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning

Starweaver
Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Management, Information Assurance, Cybersecurity, Cyber Security Strategy, Endpoint Detection and Response, Security Information and Event Management (SIEM), Incident Response, Risk Management Framework, Technical Communication, Automation

Skills you'll gain: Cyber Threat Intelligence, Threat Modeling, MITRE ATT&CK Framework, Threat Detection, Threat Management, Intelligence Collection and Analysis, Report Writing, Technical Communication, Cyber Security Strategy, Cybersecurity, Research Reports, Data Storytelling, Oral Expression, Verbal Communication Skills, Incident Response, Risk Analysis, Communication, Infrastructure Security, Analysis, Stakeholder Communications
What brings you to Coursera today?

Skills you'll gain: Operating System Administration, Digital Forensics, Cyber Threat Hunting, Incident Response, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Penetration Testing, Linux, Database Management, IT Security Architecture, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment

Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Threat Management, MITRE ATT&CK Framework, Endpoint Detection and Response, Incident Response, Cybersecurity, Google Gemini, Continuous Monitoring, Gemini, Security Strategy

Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Exploitation techniques, Intrusion Detection and Prevention, Event Monitoring, Computer Security Incident Management, Malware Protection, Network Analysis, Anomaly Detection, Network Security, Network Monitoring, Network Protocols

Infosec
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Detection, Threat Management, Endpoint Detection and Response, Cybersecurity, Security Information and Event Management (SIEM), Anomaly Detection, Generative AI, Endpoint Security, Event Monitoring, Digital Forensics, Network Analysis, Linux

Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Threat Detection, Threat Management, Security Management, Cybersecurity, Scenario Testing, Technical Communication, Simulations

EC-Council
Skills you'll gain: Digital Forensics, Network Security, Incident Response, Cryptography, Penetration Testing, Vulnerability Management, Cybersecurity, Application Security, Cyber Security Policies, Security Information and Event Management (SIEM), Threat Detection, Network Monitoring, Cloud Security, Vulnerability Assessments, Malware Protection, Mobile Security, Identity and Access Management, Internet Of Things, Risk Analysis, Web Applications