More to explore:

All Results

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Threat Management, Security Strategy, Authentications, Threat Detection, Malware Protection, Cyber Security Policies, Network Security, Authorization (Computing), Cryptography, Endpoint Security, Data Security, Security Controls, Active Directory, Azure Active Directory, Identity and Access Management

  • University of Colorado System

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Threat Management, Cybersecurity, Threat Detection, Security Awareness, Cyber Attacks, Exploitation techniques, Network Security, Vulnerability Assessments, Cloud Services, Cloud Computing, Vulnerability Management, Data Security, Human Factors (Security), Incident Response, Software As A Service

  • Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Endpoint Detection and Response, Incident Management, Endpoint Security, Network Security, Firewall, Security Software, Anomaly Detection, System Monitoring

  • Skills you'll gain: DevSecOps, AI Security, IT Security Architecture, Cyber Operations, AI Integrations, Exploit development, Incident Response, AI literacy, Zero Trust Network Access

  • Skills you'll gain: Cyber Security Strategy, Cyber Threat Intelligence, Threat Management, Network Model, IT Security Architecture, Exploitation techniques, Security Controls, Security Awareness, System Design and Implementation, Cryptography, Resilience, Service Recovery

  • Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Threat Detection, Zero Trust Network Access, Cyber Attacks, Authentications, Application Security, Cyber Risk, Information Systems Security, Data Security, Encryption, Multi-Factor Authentication, Cryptography, Authorization (Computing), Identity and Access Management

What brings you to Coursera today?

  • Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Security Awareness, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Security Strategy, Cyber Risk, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Identity and Access Management, Data Management, Cryptography

  • Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), AI Security, Threat Modeling, Generative AI, Threat Detection, Cybersecurity, Incident Response, Generative Model Architectures, Malware Protection, Prompt Engineering, Exploitation techniques, Anomaly Detection, Large Language Modeling, Vulnerability Management, Incident Management

  • Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Security Strategy, Risk Management Framework, Continuous Monitoring, Cyber Security Assessment, Security Controls, Enterprise Security, Information Privacy

  • Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Security Awareness, Cyber Operations, Cyber Security Policies, Risk Management Framework, Incident Response, Human Factors (Security)

  • Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, Computer Security Incident Management, IT Security Architecture, Cloud Security, Security Architecture Review, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Malware Protection, Cyber Attacks, Risk Management

  • Skills you'll gain: Model Evaluation, Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Model Training, Incident Response, Machine Learning Methods, Anomaly Detection, Applied Machine Learning, Continuous Monitoring, AI Security, Cryptographic Protocols, Network Security, Machine Learning Algorithms, Machine Learning, Predictive Modeling, Network Architecture, Unsupervised Learning, Supervised Learning