More to explore:

All Results

  • Skills you'll gain: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, MITRE ATT&CK Framework, Systems Development Life Cycle, Cyber Governance, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Attacks, Network Infrastructure

  • Total Seminars

    Skills you'll gain: Open Web Application Security Project (OWASP), User Accounts, Network Security, Incident Response, Security Controls, Command-Line Interface, Hardening, Cryptographic Protocols, Public Key Infrastructure, Endpoint Security, Cloud Security, Cybersecurity, Security Architecture Review, Identity and Access Management, Vulnerability Scanning, Cryptography, Vulnerability Assessments, Threat Management, Vulnerability Management, Threat Detection

  • Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Security Strategy, IT Security Architecture, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cyber Security Assessment, Network Security, Application Security, DevSecOps, Malware Protection, Security Management, Cloud Security, Encryption, Authentications

  • Skills you'll gain: Incident Response, IT Security Architecture, DevSecOps, Vulnerability Scanning, Vulnerability Assessments, Cloud Security, Threat Management, Security Management, Computer Security Incident Management, Endpoint Security, Mobile Security, Security Strategy, Cloud Computing Architecture, Cyber Threat Intelligence, Cryptographic Protocols, Cybersecurity, Cyber Security Policies, Cyber Security Strategy, Cryptography, Risk Management

  • Total Seminars

    Skills you'll gain: Cloud Computing Architecture, Cloud Engineering, Cloud Storage, Cloud Deployment, Cloud Computing, Cloud Management, Cloud Security, Cloud Platforms, Cloud Infrastructure, Cloud Hosting, Cloud Applications, Amazon CloudWatch, Software Architecture, Private Cloud, Public Cloud, Cloud-Based Integration, Cloud API, Software Development, AWS CloudFormation, Test Tools

  • Skills you'll gain: Database Administration, Disaster Recovery, Database Architecture and Administration, Database Systems, Database Management, Database Management Systems, Operational Databases, Data Maintenance, Relational Databases, Databases, Database Design, Data Management, Business Continuity Planning, Database Software, Database Theory, Transaction Processing, Data Governance, Data Security, SQL, Business Continuity

What brings you to Coursera today?

  • Total Seminars

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Metasploit, Vulnerability Assessments, Exploitation techniques, Cyber Security Assessment, Exploit development, Network Security, Cybersecurity, Vulnerability Management, Brute-force attacks, Security Testing, MITRE ATT&CK Framework, Test Planning, Cloud Security, Network Analysis, OSI Models, Linux, Web Applications, Ethical Standards And Conduct

  • Skills you'll gain: Peripheral Devices, Network Troubleshooting, Desktop Support, Computer Displays, USB, Wireless Networks, Virtualization and Virtual Machines, Network Administration, Display Devices, Virtual Machines, General Networking, TCP/IP, Virtualization, Computing Platforms, Network Support, Virtual Local Area Network (VLAN), Hardware Architecture, Data Storage, Computer Systems, Memory Management

  • Skills you'll gain: Threat Modeling, Network Security, Threat Management, Vulnerability Management, Intrusion Detection and Prevention, Hardening, Computer Security Incident Management, Security Management, Cyber Threat Intelligence, Security Awareness, Incident Response, Cybersecurity, Network Protocols, Endpoint Detection and Response, Bash (Scripting Language), Debugging, Linux, Web Presence, Python Programming, SQL

  • Skills you'll gain: Command-Line Interface, Virtualization and Virtual Machines, Network Security, Virtualization, Operating Systems, Hardware Troubleshooting, Information Technology Operations, Network Troubleshooting, Computer Hardware, Network Support, Cloud Computing, Mac OS, Security Controls, Microsoft Windows, Information Systems Security, System Configuration, Operating System Administration, Network Infrastructure, Data Storage, Peripheral Devices

  • Skills you'll gain: Computer Security Incident Management, Vulnerability Management, Cyber Security Strategy, Cyber Governance, Incident Response, Cyber Operations, Cyber Threat Intelligence, Encryption, Cyber Attacks, Governance Risk Management and Compliance, Incident Management, Cryptographic Protocols, Threat Detection, Security Strategy, Network Model, Mobile Security, Vulnerability, Security Awareness, Vulnerability Assessments, Vulnerability Scanning

  • Skills you'll gain: Git (Version Control System), Package and Software Management, Linux Administration, Containerization, Bash (Scripting Language), Version Control, File Systems, Ubuntu, Linux Servers, Linux, Linux Commands, Docker (Software), Operating System Administration, User Accounts, Command-Line Interface, Shell Script, Ansible, Firewall, Systems Administration, Microsoft Windows