All Results
Status: Free TrialSkills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things
Status: Free TrialJohns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Intrusion Detection and Prevention, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Wireless Networks, Splunk, Information Privacy
Status: Free TrialLearnQuest
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Cloud Security, Disaster Recovery, Threat Management, Firewall, Security Management, Network Security, Cybersecurity, Cloud Services, AI Security, Network Monitoring, Cyber Security Policies, Cloud Management
Status: Free TrialSkills you'll gain: Penetration Testing, Exploit development, OSI Models, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Network Protocols, Network Security, Cyber Security Assessment, General Networking, Vulnerability Scanning, Cybersecurity, Prompt Engineering, Large Language Modeling, AI Security, LLM Application, Test Script Development, Scripting, Scripting Languages, Python Programming
Status: Free TrialSkills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Exploitation techniques, Hardening, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Business Logic, Cloud Security, API Testing, Wireless Networks, Data Persistence, Application Programming Interface (API)
Status: Free TrialJohns Hopkins University
Skills you'll gain: Anomaly Detection, Malware Protection, Threat Detection, Network Analysis, AI Security, Cybersecurity, Model Evaluation, Network Security, Machine Learning Methods, Classification Algorithms, Microsoft Windows
What brings you to Coursera today?
Status: Free TrialJohns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Security Assessment, Cybersecurity, Operating System Administration, Operating Systems, Hardening, Computer Security, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Identity and Access Management, Memory Management, Data Persistence, Computer Architecture

Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript
Status: Free TrialSkills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Exploit development, Application Security, Security Testing, Exploitation techniques, Vulnerability Scanning, Security Awareness, Vulnerability Assessments, Human Factors (Security), Hardening
Status: Free TrialJohns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Exploitation techniques, Mobile Security, Vulnerability Scanning, Cybersecurity, Security Testing, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Network Protocols
Status: Free TrialSkills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation
Status: Free TrialSkills you'll gain: Remote Access Systems, Network Troubleshooting, Network Administration, Virtual Private Networks (VPN), Hardening, TCP/IP, Cybersecurity, Human Factors (Security), Computer Networking, Hardware Troubleshooting, Network Performance Management, Command-Line Interface, Authentications, Wireless Networks