More to explore:

All Results

  • Check Point Software Technologies Ltd.

    Skills you'll gain: Virtual Private Networks (VPN), Threat Management, Network Security, Firewall, Threat Detection, Intrusion Detection and Prevention, Disaster Recovery, Remote Access Systems, Network Administration, Data Integrity, Network Monitoring, Cyber Security Policies, Security Controls, System Configuration, Network Troubleshooting, Security Management, System Monitoring, Active Directory

  • Skills you'll gain: Google Cloud Platform, Cloud Security, Cloud Deployment, Public Cloud, Cloud Infrastructure, Cloud Solutions, Cloud Management, Firewall, Security Management, System Configuration, Security Controls, Network Security, Cloud Storage, General Networking

  • Check Point Software Technologies Ltd.

    Skills you'll gain: Threat Management, Threat Detection, Security Controls, Cyber Security Policies, Intrusion Detection and Prevention, Network Troubleshooting, Identity and Access Management, Firewall, Security Management, Vulnerability Management, Cryptographic Protocols, Infrastructure Security, Network Administration, Public Key Infrastructure, Cloud Management, Active Directory, System Configuration, Software Installation, Package and Software Management, Command-Line Interface

  • Check Point Software Technologies Ltd.

    Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Security Policies, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Infrastructure Architecture, Communication Systems, Package and Software Management, Linux, Software Versioning

  • Skills you'll gain: Command-Line Interface, Firewall, System Configuration, Security Management, Network Security, Network Administration, Network Monitoring, Virtualization

  • Skills you'll gain: Identity and Access Management, Cloud Security, DevSecOps, Cloud Computing, Role-Based Access Control (RBAC), Google Cloud Platform, Network Security, Cloud Infrastructure, Cloud Computing Architecture, IT Automation, General Networking, Cloud Technologies, Infrastructure Security, Cybersecurity, Security Controls, Infrastructure as Code (IaC), Digital Transformation

What brings you to Coursera today?

  • Skills you'll gain: User Provisioning, User Accounts, Cloud Management, Mobile Security, Cloud Computing, Security Controls, Identity and Access Management, Cloud Security, Authentications, Security Assertion Markup Language (SAML), Cyber Security Policies, Single Sign-On (SSO), System Configuration, Google Workspace, Event Monitoring

  • Skills you'll gain: Cloud Security, IT Security Architecture, DevSecOps, Security Controls, Security Information and Event Management (SIEM), AWS Identity and Access Management (IAM), Infrastructure as Code (IaC), Infrastructure Security, Cyber Security Assessment, Identity and Access Management, Cyber Security Policies, Cloud Computing, Vulnerability Management, Continuous Monitoring, Network Security, NIST 800-53, Authorization (Computing), Threat Detection, Auditing, Anomaly Detection

  • Skills you'll gain: Google Cloud Platform, Cost Management, Cloud Management, System Monitoring, Application Performance Management, Cloud Security, Identity and Access Management, Key Management, Cloud Deployment, Cloud Platforms, Cloud Services, Infrastructure as Code (IaC), Continuous Monitoring, Cloud-Based Integration, Encryption, Role-Based Access Control (RBAC), Configuration Management, Event-Driven Programming

  • Skills you'll gain: Azure Active Directory, Endpoint Security

  • Skills you'll gain: Threat Detection, Vulnerability Management, Vulnerability Assessments, Cloud Security, Multi-Cloud, Threat Management, Google Cloud Platform, Enterprise Security

  • Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Cloud Management, User Provisioning, Virtual Networking, Firewall, Network Security, Data Access, Role-Based Access Control (RBAC), Authorization (Computing), Data Security, Single Sign-On (SSO), Authentications, Load Balancing