Results for "cyber security technologies"

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Business Continuity Planning, Cryptography, Security Architecture Review, Disaster Recovery, Business Continuity, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, Law, Regulation, and Compliance, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Governance Risk Management and Compliance

Skills you'll gain: Penetration Testing, Record Keeping, Vulnerability Scanning, Security Testing, Data Management, Cloud Management, Threat Management, Cyber Security Assessment, Records Management, Cloud Computing Architecture, Authentications, Firewall, Cyber Attacks, Cybersecurity, Cyber Threat Intelligence, Authorization (Computing), Generative Adversarial Networks (GANs), Active Directory, Data Ethics, AI Security

Skills you'll gain: Incident Response, Hybrid Cloud Computing, Zero Trust Network Access, Incident Management, Computer Security Incident Management, Security Information and Event Management (SIEM), Endpoint Detection and Response, Containerization, Event Monitoring, Enterprise Security, Telecommunications, Cybersecurity, Threat Detection, Security Controls, Network Security, Network Architecture

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness

Macquarie University
Skills you'll gain: Incident Response, Cyber Governance, Incident Management, Cyber Security Strategy, Computer Security Incident Management, Cyber Security Policies, Governance Risk Management and Compliance, Threat Management, Cyber Risk, Event Monitoring, Security Strategy, Cyber Attacks, Security Management, Cybersecurity, Cyber Security Assessment, Governance, Compliance Management, Cyber Operations, Risk Management, Risk Control

Macquarie University
Skills you'll gain: Incident Response, Cyber Governance, Incident Management, Computer Security Incident Management, Safety Culture, Cyber Risk, Security Awareness, Event Monitoring, Cyber Security Strategy, Cyber Attacks, Dashboard, Threat Management, Security Management, Cyber Security Policies, Cyber Threat Intelligence, Mobile Security, Corporate Communications, Cybersecurity, Cyber Security Assessment, Cyber Operations
What brings you to Coursera today?

University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Cyber Risk, Encryption, ISO/IEC 27001, Threat Management, Cyber Governance, Risk Management Framework, Computer Security, Information Assurance, Security Controls, Enterprise Security, Data Integrity

New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Cyber Security Assessment

Skills you'll gain: AI Security, Threat Detection, Large Language Modeling, Intrusion Detection and Prevention, LLM Application, Cybersecurity, Cyber Security Strategy, Applied Machine Learning, Fraud detection, AI Integrations, Cyber Engineering, IT Automation, Machine Learning Methods, Cyber Attacks, Anomaly Detection, Federated Learning, Malware Protection, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Cyber Risk

Skills you'll gain: AI Security, MITRE ATT&CK Framework, Penetration Testing, Incident Response, Cyber Threat Hunting, Cybersecurity, Cyber Threat Intelligence, DevSecOps, Digital Forensics, Cloud Security, Patch Management, Cyber Security Assessment, Exploitation techniques, Business Continuity Planning, Network Security, Computer Security Incident Management, Business Continuity, Responsible AI, DevOps, Disaster Recovery

Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Threat Management, Cybersecurity, Computer Security Incident Management, IT Security Architecture, Cloud Security, Security Architecture Review, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Risk Management

Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Service Management, IT Management, Responsible AI, Compliance Auditing, Cyber Risk, Data Ethics, Cyber Governance, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Regulation and Legal Compliance, Compliance Management, Law, Regulation, and Compliance, Cyber Security Assessment, ISO/IEC 27001, Risk Management