More to explore:

All Results

  • Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Network Security, Cryptography, Threat Management, Information Systems Security, Threat Detection, Cloud Security

  • Skills you'll gain: Open Web Application Security Project (OWASP), AI Security, Vulnerability Assessments, Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

  • Skills you'll gain: Penetration Testing, Metasploit, Exploitation techniques, Cloud Security, Vulnerability Scanning, Security Testing, Network Security, Application Security, Vulnerability Assessments, Cybersecurity, Mobile Security, Wireless Networks, Human Factors (Security), Network Analysis, Linux, Technical Communication

  • Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Exploit development, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Security Testing, Scripting, Vulnerability Assessments, Hardening, Brute-force attacks, General Networking, Scripting Languages, Shell Script, Network Administration, Cybersecurity, Network Security

  • LearnKartS

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Security Testing, Cyber Security Assessment, Cybersecurity, Network Security, Cyber Attacks, Cryptography, Vulnerability Scanning, Kubernetes, Application Security, Cloud Infrastructure, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Threat Hunting, Cyber Operations, Security Controls, Security Awareness, Cyber Risk, Security Strategy

  • Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Network Analysis

What brings you to Coursera today?

  • Johns Hopkins University

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Cryptography, Mobile Security, Cryptographic Protocols, Security Testing, Vulnerability Scanning, Cyber Security Assessment, Application Security, Operating System Administration, Network Security, Operating Systems, Encryption, Hardening

  • University of Colorado Boulder

    Skills you'll gain: AI Security, Penetration Testing, Exploit development, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Security Testing, Cyber Security Assessment, Cyber Operations, Computer Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Cyber Security Strategy, Security Testing, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Linux, Linux Administration

  • Skills you'll gain: Metasploit, Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Cyber Operations, Malware Protection, Network Protocols, Security Testing, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP)

  • Skills you'll gain: Penetration Testing, Security Testing, Hardening, Test Script Development, Brute-force attacks, Business Logic, Cloud Security, Network Analysis, Programming Principles, API Testing, General Data Protection Regulation (GDPR), Cloud Computing, Wireless Networks, Data Persistence, Application Programming Interface (API), Data Security

  • Skills you'll gain: Cryptography, Encryption, Cybersecurity, Application Security, Brute-force attacks, Penetration Testing, Python Programming, Key Management, File I/O, Computational Logic, Program Development, Algorithms, Programming Principles, Debugging, Code Reusability, Scripting, Data Mapping, Software Testing, User Interface (UI), UI Components