More to explore:

All Results

  • Skills you'll gain: MITRE ATT&CK Framework, Network Security, Cybersecurity, Exploitation techniques, Penetration Testing, Cyber Attacks, Python Programming, Data Access, Authentications, Scripting, Remote Access Systems, User Accounts

  • Kennesaw State University

    Skills you'll gain: Professional Networking, LinkedIn, Mentorship, Professional Development, Interviewing Skills, Trustworthiness, Social Media, Rapport Building, Relationship Building, Social Media Strategy, Social Media Content, Planning, Professionalism, Strategic Communication, Communication, Habit Formation, Market Opportunities, Leadership, Lifelong Learning, Goal Setting

  • The State University of New York

    Skills you'll gain: Digital Design, digital literacy, Infographics, Content Creation, Graphic Design, Digital Publishing, Creative Design, Visual Design, Brainstorming, Planning, Information Management, Research, Literacy, Lifelong Learning, Critical Thinking, Investigation, Multimedia, Open Source Technology, Intellectual Property, Document Management

  • Skills you'll gain: Spring Boot, Cloud Deployment, Application Deployment, Google Cloud Platform, Cloud Applications, Key Management, System Configuration, Software Configuration Management, Application Development, Java

  • Skills you'll gain: Multi-Factor Authentication, Role-Based Access Control (RBAC), Authentications, Azure Active Directory, Zero Trust Network Access, Microsoft Azure, Identity and Access Management, User Provisioning, Active Directory, Authorization (Computing), Security Controls, Cloud Security, User Accounts, Continuous Monitoring, Cloud Services, Security Strategy

  • Skills you'll gain: Stakeholder Analysis, Stakeholder Management, Relationship Building, Stakeholder Engagement, Strategic Partnership, Stakeholder Communications, Influencing, Relationship Management, Internal Communications, Professional Networking, Conflict Management, Political Sciences, Collaboration, Organizational Effectiveness, Risk Analysis, Leadership Studies, Advocacy, Personal Integrity, Ethical Standards And Conduct

What brings you to Coursera today?

  • Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Amazon S3, Security Assertion Markup Language (SAML), Authorization (Computing), OAuth, Role-Based Access Control (RBAC), User Provisioning, Authentications, Single Sign-On (SSO), Data Storage Technologies, Cloud Storage, User Accounts, Data Security, Multi-Factor Authentication, Encryption

  • Skills you'll gain: Cyber Operations, Penetration Testing, Cybersecurity, Exploitation techniques, Authentications, Scripting, Python Programming, Data Access, Identity and Access Management, Network Protocols

  • Skills you'll gain: Security Controls, Multi-Factor Authentication, Security Management, Authorization (Computing), User Accounts, Content Management Systems, User Provisioning, Identity and Access Management, Data Security, Authentications, Data Management, Data Access, IT Security Architecture, Encryption

  • Skills you'll gain: Growth Mindedness, Professional Development, Lifelong Learning, Professional Networking, Adaptability, Willingness To Learn, Collaboration, Curiosity, Communication, Mentorship, Personal Development, Strategic Decision-Making, Emerging Technologies

  • Skills you'll gain: Stakeholder Engagement, Journey Mapping, Stakeholder Management, Customer Engagement, Consultative Approaches, Stakeholder Communications, Agile Methodology, Stakeholder Analysis, Requirements Elicitation, SAP Applications, SAP S/4HANA, Customer Analysis, Technical Consulting, Customer Insights, Consulting, Process Analysis, Solution Design, Business Analysis, Project Management, Business Requirements

  • Skills you'll gain: Identity and Access Management, Cryptography, AWS Identity and Access Management (IAM), Data Security, Authentications, Threat Detection, Cybersecurity, Encryption, Network Security, Data Management, Azure Active Directory, Security Controls, Cyber Attacks, Cyber Security Strategy, Cyber Governance, Key Management, Security Management, Cyber Risk, Computer Security, Security Awareness