More to explore:

All Results

  • Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Network Security, Cryptography, Threat Management, Information Systems Security, Threat Detection, Cloud Security

  • Skills you'll gain: Open Web Application Security Project (OWASP), AI Security, Vulnerability Assessments, Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

  • Skills you'll gain: Vulnerability Scanning, Cyber Security Assessment, Security Testing, Cybersecurity, Cyber Threat Intelligence, Cyber Threat Hunting, Cyber Operations, Cyber Security Strategy, Cyber Attacks, Exploitation techniques, Problem Solving

  • Skills you'll gain: AI Security, Threat Modeling, Threat Management, LLM Application, MITRE ATT&CK Framework, LangChain, Threat Detection, Large Language Modeling, Continuous Monitoring, Event Monitoring, Security Testing, Cyber Threat Intelligence, Generative AI, Embeddings, LangGraph, Prompt Engineering, Vector Databases

  • Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Cybersecurity, Cyber Security Strategy, Exploitation techniques, Cyber Attacks, Cyber Security Policies

  • Skills you'll gain: Multi-Factor Authentication, Data Security, Security Strategy, Authentications, Azure Active Directory, Database Architecture and Administration, Virtual Machines, Microsoft SQL Servers, Microsoft Azure, Cloud Security, Security Controls, Identity and Access Management, Application Security, IT Security Architecture, Virtualization and Virtual Machines, Network Security, Role-Based Access Control (RBAC), Encryption, Firewall, Threat Detection

What brings you to Coursera today?

  • Skills you'll gain: Ansible, Red Hat Enterprise Linux, Package and Software Management, User Accounts, IT Automation, Software Installation, OS Process Management, Devops Tools, Linux Administration, File Systems, Linux Commands, Network Administration, Data Storage, Automation, Infrastructure as Code (IaC), YAML, Scripting, Linux, Linux Servers, System Configuration

  • Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Threat Intelligence, Vulnerability Assessments, Exploitation techniques, Network Security, Network Analysis, Network Protocols

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Penetration Testing, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security), Network Analysis

  • Skills you'll gain: Mobile Security, Wireless Networks, Network Security, Application Security, Internet Of Things, Endpoint Security, Cybersecurity, Information Systems Security, Infrastructure Security, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Data Security, Encryption

  • Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Security Testing, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security

  • Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Malware Protection, Threat Detection, Penetration Testing, Threat Management, Cybersecurity, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security