More to explore:

Results for "cyber security technologies"

  • Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Business Continuity Planning, Cryptography, Security Architecture Review, Disaster Recovery, Business Continuity, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, Law, Regulation, and Compliance, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Governance Risk Management and Compliance

  • Skills you'll gain: Penetration Testing, Record Keeping, Vulnerability Scanning, Security Testing, Data Management, Cloud Management, Threat Management, Cyber Security Assessment, Records Management, Cloud Computing Architecture, Authentications, Firewall, Cyber Attacks, Cybersecurity, Cyber Threat Intelligence, Authorization (Computing), Generative Adversarial Networks (GANs), Active Directory, Data Ethics, AI Security

  • Skills you'll gain: Incident Response, Hybrid Cloud Computing, Zero Trust Network Access, Incident Management, Computer Security Incident Management, Security Information and Event Management (SIEM), Endpoint Detection and Response, Containerization, Event Monitoring, Enterprise Security, Telecommunications, Cybersecurity, Threat Detection, Security Controls, Network Security, Network Architecture

  • Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness

  • Skills you'll gain: Incident Response, Cyber Governance, Incident Management, Cyber Security Strategy, Computer Security Incident Management, Cyber Security Policies, Governance Risk Management and Compliance, Threat Management, Cyber Risk, Event Monitoring, Security Strategy, Cyber Attacks, Security Management, Cybersecurity, Cyber Security Assessment, Governance, Compliance Management, Cyber Operations, Risk Management, Risk Control

  • Skills you'll gain: Incident Response, Cyber Governance, Incident Management, Computer Security Incident Management, Safety Culture, Cyber Risk, Security Awareness, Event Monitoring, Cyber Security Strategy, Cyber Attacks, Dashboard, Threat Management, Security Management, Cyber Security Policies, Cyber Threat Intelligence, Mobile Security, Corporate Communications, Cybersecurity, Cyber Security Assessment, Cyber Operations

What brings you to Coursera today?

  • University of London

    Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Cyber Risk, Encryption, ISO/IEC 27001, Threat Management, Cyber Governance, Risk Management Framework, Computer Security, Information Assurance, Security Controls, Enterprise Security, Data Integrity

  • New York University

    Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Cyber Security Assessment

  • Skills you'll gain: AI Security, Threat Detection, Large Language Modeling, Intrusion Detection and Prevention, LLM Application, Cybersecurity, Cyber Security Strategy, Applied Machine Learning, Fraud detection, AI Integrations, Cyber Engineering, IT Automation, Machine Learning Methods, Cyber Attacks, Anomaly Detection, Federated Learning, Malware Protection, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Cyber Risk

  • Skills you'll gain: AI Security, MITRE ATT&CK Framework, Penetration Testing, Incident Response, Cyber Threat Hunting, Cybersecurity, Cyber Threat Intelligence, DevSecOps, Digital Forensics, Cloud Security, Patch Management, Cyber Security Assessment, Exploitation techniques, Business Continuity Planning, Network Security, Computer Security Incident Management, Business Continuity, Responsible AI, DevOps, Disaster Recovery

  • Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Threat Management, Cybersecurity, Computer Security Incident Management, IT Security Architecture, Cloud Security, Security Architecture Review, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Risk Management

  • Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Service Management, IT Management, Responsible AI, Compliance Auditing, Cyber Risk, Data Ethics, Cyber Governance, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Regulation and Legal Compliance, Compliance Management, Law, Regulation, and Compliance, Cyber Security Assessment, ISO/IEC 27001, Risk Management