More to explore:

All Results

  • Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, General Networking, Network Model, Network Infrastructure, Firewall, Security Controls, Cloud Computing, Virtual Private Networks (VPN)

  • Skills you'll gain: Incident Response, Hybrid Cloud Computing, Zero Trust Network Access, Incident Management, Computer Security Incident Management, Security Information and Event Management (SIEM), Endpoint Detection and Response, Containerization, Event Monitoring, Enterprise Security, Telecommunications, Cybersecurity, Threat Detection, Security Controls, Network Security, Network Architecture

  • Skills you'll gain: General Data Protection Regulation (GDPR), Regulatory Compliance, Information Privacy, Personally Identifiable Information, Regulation and Legal Compliance, Compliance Auditing, Analytical Skills, Gap Analysis, Prioritization

  • Arizona State University

    Skills you'll gain: Statistical Process Controls, Process Control, Semiconductors, Quality Assurance, Process Validation, Production Process, Verification And Validation, Electronics Engineering, Manufacturing Operations, Manufacturing Processes, Manufacturing and Production, Manufacturing Standards, Electronics, Hardware Design, Process Improvement, Reliability, Electronic Components, Electronic Hardware, Hardware Architecture, Thermal Management

  • Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Security Assertion Markup Language (SAML), Encryption, Single Sign-On (SSO), Amazon Web Services, Active Directory, Authentications, Cloud Security, Data Security, User Provisioning, Azure Active Directory, Key Management, User Accounts, AWS CloudFormation, Authorization (Computing), Network Security, Cloud Computing, Virtual Private Networks (VPN)

  • Skills you'll gain: Incident Response, Security Management, Computer Security Incident Management, Security Strategy, Cloud Security, Cryptographic Protocols, Cybersecurity, Cyber Governance, Cryptography, Public Key Infrastructure, Network Security, Digital Forensics, Risk Management

What brings you to Coursera today?

  • Skills you'll gain: Electrical Systems, Electrical Power, Electric Power Systems, Electrical Equipment, Electrical Safety, High Voltage, Basic Electrical Systems, Energy and Utilities, Electrical Engineering, Engineering, Scientific, and Technical Instruments, Equipment Design, Laboratory Testing, Coordination

  • Macquarie University

    Skills you'll gain: Cyber Risk, Security Awareness, Cyber Attacks, Mobile Security, Cybersecurity, Cyber Security Assessment, Cyber Security Policies, Cyber Threat Hunting, Data Security, Security Strategy, Email Security, Authentications, Security Management

  • Skills you'll gain: Amazon Web Services, Control Panels, Cloud Deployment, Application Deployment

  • Skills you'll gain: Cyber Threat Intelligence, Cyber Security Strategy, Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Model Training, Threat Modeling, Machine Learning Methods, Python Programming

  • Skills you'll gain: Information Privacy, General Data Protection Regulation (GDPR), Personally Identifiable Information, Data Security, Data Governance, Data Ethics, Law, Regulation, and Compliance, Data Loss Prevention, Data Management, Security Controls, Regulatory Compliance, Compliance Management, Compliance Training, Data Integrity, Security Strategy, Safety Culture, Data Processing, Incident Response, Employee Training

  • Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Incident Management, Cyber Threat Intelligence, Continuous Monitoring, Security Controls, Network Security, Network Monitoring, Splunk, Network Analysis, TCP/IP, Network Protocols, Document Management, Query Languages