More to explore:

All Results

  • Skills you'll gain: Cryptographic Protocols, Network Security, Encryption, OSI Models, Cryptography, IT Security Architecture, Network Performance Management, Network Architecture, Computer Networking, General Networking, Communication Systems, Remote Access Systems, TCP/IP, Network Infrastructure, Network Protocols, Wireless Networks, Virtual Private Networks (VPN), Virtual Networking, Endpoint Security, Cloud Security

  • Skills you'll gain: Hardening, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response, Network Architecture, Network Security, Intrusion Detection and Prevention, Incident Management, Network Protocols, Threat Detection, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Network Monitoring, Network Infrastructure, Cyber Attacks, Computer Security Incident Management, Operating Systems, Linux, Bash (Scripting Language), Databases

  • Royal Holloway, University of London

    Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, IT Security Architecture, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks

  • Skills you'll gain: Incident Response, Hybrid Cloud Computing, Zero Trust Network Access, Incident Management, Computer Security Incident Management, Security Information and Event Management (SIEM), Endpoint Detection and Response, Containerization, Event Monitoring, Enterprise Security, Telecommunications, Cybersecurity, Threat Detection, Security Controls, Network Security, Network Architecture

  • Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Cloud Security, Disaster Recovery, Threat Management, Firewall, Security Management, Network Security, Cybersecurity, Cloud Services, AI Security, Network Monitoring, Cyber Security Policies, Cloud Management

  • University of Colorado System

    Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Open Shortest Path First (OSPF), Network Routers, Communication Systems, Telecommunications, Dynamic Host Configuration Protocol (DHCP), Network Planning And Design, Network Security, Network Switches, General Networking, Network Performance Management, Computer Networking, Network Architecture, Network Infrastructure

What brings you to Coursera today?

  • University of Colorado System

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies, Security Controls

  • Skills you'll gain: Network Security, Virtual Private Networks (VPN), Authentications, Firewall, Authorization (Computing), Computer Security, Remote Access Systems, Cybersecurity, General Networking, Network Monitoring, Security Controls, IT Automation, Software-Defined Networking, Wireless Networks, Dynamic Host Configuration Protocol (DHCP), Virtual Local Area Network (VLAN), Automation, Network Routing, Encryption, Application Programming Interface (API)

  • Skills you'll gain: Firewall, Network Support, Virtual Private Networks (VPN), Network Troubleshooting, Network Routing, Network Security, Routing Protocols, Intrusion Detection and Prevention, Authentications, Network Monitoring, Event Monitoring, Lightweight Directory Access Protocols, Technical Support and Services, Remote Access Systems, Network Administration, Security Engineering, Application Security, Cybersecurity, Computer Security, Cyber Security Strategy

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

  • Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, General Networking, Network Model, Network Infrastructure, Firewall, Security Controls, Cloud Computing, Virtual Private Networks (VPN)

  • Skills you'll gain: Cryptography, Network Security, Cryptographic Protocols, OSI Models, Public Key Infrastructure, Cybersecurity, Advanced Encryption Standard (AES), Key Management, Network Protocols, Encryption, Threat Modeling, Data Encryption Standard, Remote Access Systems, Firewall, Brute-force attacks, Emerging Technologies, TCP/IP, Wireless Networks, Local Area Networks, Authentications