More to explore:

All Results

  • Skills you'll gain: Cyber Governance, Cybersecurity, Cyber Security Policies, Intrusion Detection and Prevention, Cryptography, Network Security, Cyber Risk, Cryptographic Protocols, Cyber Attacks, IT Security Architecture, Cyber Security Assessment, Cyber Security Strategy, Threat Management, Risk Management Framework, Threat Detection, Encryption, Incident Response

  • Skills you'll gain: IT Security Architecture, Network Security, Cybersecurity, Endpoint Detection and Response, Data Security, Network Architecture, Application Security, Information Technology Architecture

  • Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Service Management, IT Management, Responsible AI, Compliance Auditing, Cyber Risk, Data Ethics, Cyber Governance, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Regulation and Legal Compliance, Compliance Management, Law, Regulation, and Compliance, Cyber Security Assessment, ISO/IEC 27001, Risk Management

  • Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Security Awareness, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Security Strategy, Cyber Risk, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Identity and Access Management, Data Management, Cryptography

  • Skills you'll gain: Embedded Software, Real-Time Operating Systems, Software Development, Software Design, Software Architecture, Embedded Systems, Configuration Management, Development Environment, Middleware, Systems Architecture, Application Development, Extensible Markup Language (XML), System Configuration, Application Frameworks

  • Skills you'll gain: MITRE ATT&CK Framework, Threat Detection, Cybersecurity, Network Security, Cyber Security Strategy, System Monitoring, Cyber Operations, Threat Management, Continuous Monitoring, Exploitation techniques, Penetration Testing, Cyber Attacks, Data Persistence, Scripting, IT Automation, Network Monitoring, Persistence, Python Programming, Data Access, Computer Programming

What brings you to Coursera today?

  • Skills you'll gain: Application Deployment, Android Studio, Android Development, Android (Operating System), Mobile Development, System Software, Software Installation, Application Development, Embedded Systems, Systems Architecture, Software Testing, Application Frameworks, Software Architecture, User Interface (UI) Design

  • Skills you'll gain: Process Driven Development, Software Quality Assurance, Process Management, Software Development, Verification And Validation, Software Engineering, Software Development Life Cycle, Software Development Methodologies, Quality Assurance, Systems Engineering, Configuration Management, Requirements Analysis, Process Modeling, Quality Control

  • Skills you'll gain: AI Security, Threat Detection, Large Language Modeling, Intrusion Detection and Prevention, LLM Application, Cybersecurity, Cyber Security Strategy, Applied Machine Learning, Fraud detection, AI Integrations, Cyber Engineering, IT Automation, Machine Learning Methods, Cyber Attacks, Anomaly Detection, Federated Learning, Malware Protection, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Cyber Risk

  • Skills you'll gain: AI Security, Cyber Threat Intelligence, DevSecOps, Security Information and Event Management (SIEM), AI Integrations, Agentic Workflows, Cybersecurity, Cyber Security Assessment, AI Personalization, Threat Detection, AI Workflows, Model Deployment, Incident Response, ChatGPT, OpenAI, Malware Protection, Cloud Security

  • Skills you'll gain: Penetration Testing, Record Keeping, Vulnerability Scanning, Security Testing, Data Management, Cloud Management, Threat Management, Cyber Security Assessment, Records Management, Cloud Computing Architecture, Authentications, Firewall, Cyber Attacks, Cybersecurity, Cyber Threat Intelligence, Authorization (Computing), Generative Adversarial Networks (GANs), Active Directory, Data Ethics, AI Security

  • Johns Hopkins University

    Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Fraud detection, Model Evaluation, Malware Protection, Cybersecurity, Threat Detection, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Classification Algorithms, Email Security, Network Security, Jupyter, Authentications, Machine Learning Methods, Machine Learning Algorithms, Artificial Intelligence