All Results

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Threat Management, Security Strategy, Authentications, Threat Detection, Malware Protection, Cyber Security Policies, Network Security, Authorization (Computing), Cryptography, Endpoint Security, Data Security, Security Controls, Active Directory, Azure Active Directory, Identity and Access Management

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Threat Management, Cybersecurity, Threat Detection, Security Awareness, Cyber Attacks, Exploitation techniques, Network Security, Vulnerability Assessments, Cloud Services, Cloud Computing, Vulnerability Management, Data Security, Human Factors (Security), Incident Response, Software As A Service

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Endpoint Detection and Response, Incident Management, Endpoint Security, Network Security, Firewall, Security Software, Anomaly Detection, System Monitoring

Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Threat Detection, Zero Trust Network Access, Cyber Attacks, Authentications, Application Security, Cyber Risk, Information Systems Security, Data Security, Encryption, Multi-Factor Authentication, Cryptography, Authorization (Computing), Identity and Access Management

Skills you'll gain: DevSecOps, AI Security, IT Security Architecture, Cyber Operations, AI Integrations, Exploit development, Incident Response, AI literacy, Zero Trust Network Access

LearnKartS
Skills you'll gain: Cyber Security Strategy, Cyber Threat Intelligence, Threat Management, Network Model, IT Security Architecture, Exploitation techniques, Security Controls, Security Awareness, System Design and Implementation, Cryptography, Resilience, Service Recovery
What brings you to Coursera today?

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Security Awareness, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Security Strategy, Cyber Risk, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Identity and Access Management, Data Management, Cryptography

Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), AI Security, Threat Modeling, Generative AI, Threat Detection, Cybersecurity, Incident Response, Generative Model Architectures, Malware Protection, Prompt Engineering, Exploitation techniques, Anomaly Detection, Large Language Modeling, Vulnerability Management, Incident Management

Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Security Strategy, Risk Management Framework, Continuous Monitoring, Cyber Security Assessment, Security Controls, Enterprise Security, Information Privacy

Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Security Awareness, Cyber Operations, Cyber Security Policies, Risk Management Framework, Incident Response, Human Factors (Security)

Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, Computer Security Incident Management, IT Security Architecture, Cloud Security, Security Architecture Review, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Malware Protection, Cyber Attacks, Risk Management

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, Routing Protocols, TCP/IP, Internet Of Things, Network Security, Cyber Attacks, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software), Containerization