More to explore:

All Results

  • Skills you'll gain: Internet Of Things, Cybersecurity, Cyber Security Strategy, Information Systems Security, Cyber Engineering, Cyber Security Policies, Cyber Attacks, Security Awareness, Information Privacy, Data Security, Emerging Technologies, Enterprise Security

  • Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, Routing Protocols, TCP/IP, Internet Of Things, Network Security, Cyber Attacks, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software), Containerization

  • Skills you'll gain: Application Security, Data Security, Information Systems Security, Internet Of Things, Threat Modeling, Cybersecurity, Cloud Security, Security Engineering, Cryptography, Secure Coding, Network Security, Cyber Attacks, Mobile Security, Vulnerability, Risk Management Framework, Threat Management, Encryption, Cloud Services, Web Applications, Cloud Platforms

  • Skills you'll gain: Hardware Architecture, Security Engineering, Security Controls, Internet Of Things, Encryption, Network Security, Vulnerability Assessments, Cybersecurity, Data Security, Vulnerability Management, General Data Protection Regulation (GDPR), Cryptography, Information Privacy

  • University of Colorado Boulder

    Skills you'll gain: Real-Time Operating Systems, Internet Of Things, Security Engineering, Information Systems Security, Wireless Networks, Infrastructure Security, General Networking, Network Security, Cybersecurity, Security Controls, IBM Cloud, Computing Platforms, Cloud Platforms, Cryptography, Advanced Encryption Standard (AES), Network Protocols, Market Opportunities, Automation, Emerging Technologies, Endpoint Security

  • Skills you'll gain: Model Evaluation, Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Model Training, Incident Response, Machine Learning Methods, Anomaly Detection, Applied Machine Learning, Continuous Monitoring, AI Security, Cryptographic Protocols, Network Security, Machine Learning Algorithms, Machine Learning, Predictive Modeling, Network Architecture, Unsupervised Learning, Supervised Learning

What brings you to Coursera today?

  • Skills you'll gain: Threat Modeling, IT Security Architecture, Network Security, Security Architecture Review, Internet Of Things, Identity and Access Management, Encryption, Cybersecurity, Security Controls, Threat Management, Cloud Security, Vulnerability Assessments, Threat Detection, Cloud Solutions, Cryptographic Protocols, Systems Architecture, Cloud Services, Authentications

  • Skills you'll gain: Threat Modeling, IT Security Architecture, Cloud Security, Internet Of Things, Infrastructure Security, Vulnerability Management, Information Systems Security, Incident Response, Identity and Access Management, Threat Management, Computer Security Incident Management, Penetration Testing, Network Security, Security Controls, Security Testing, Cloud Computing, Cloud Computing Architecture, Threat Detection, Incident Management, Cloud Deployment

  • Skills you'll gain: Application Security, Network Security, Information Systems Security, Cloud Security, Cybersecurity, System Monitoring, Internet Of Things, Network Monitoring, Cyber Attacks, Mobile Security, Cryptography, Information Privacy, Authorization (Computing), Wireless Networks, Authentications, Data Storage, Patch Management, Operating Systems, Cloud Services, Cloud Platforms

  • Skills you'll gain: Open Web Application Security Project (OWASP), Exploitation techniques, Internet Of Things, Security Testing, Embedded Software, Cyber Security Assessment, Hardware Troubleshooting, Vulnerability Assessments, Test Tools, Cybersecurity, Embedded Systems, Network Security, General Networking

  • Skills you'll gain: Cloud Security, Internet Of Things, Network Security, Application Security, Security Management, Data Security, Cloud Services, Security Controls, Time Series Analysis and Forecasting, Cryptography, Data Analysis, Cryptographic Protocols, Identity and Access Management, Data Integrity, Authentications, Vulnerability Assessments

  • Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Telecommunications, Virtual Private Networks (VPN), Infrastructure Security, Data Security, Security Awareness, Remote Access Systems, Network Protocols, Information Privacy, Communication Systems, Emerging Technologies