All Results

Skills you'll gain: Cybersecurity, Cyber Operations, Data Persistence, Exploitation techniques, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Scripting Languages

Skills you'll gain: Penetration Testing, Exploitation techniques, Scenario Testing, Cybersecurity, Vulnerability Assessments, Linux Administration, Linux Servers, Linux, Command-Line Interface, Linux Commands, Cryptography, File Management, Microsoft Windows, Unix Shell, Virtual Machines

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)

Microsoft
Skills you'll gain: Microsoft Azure, Application Security, Cloud Security, IT Security Architecture, Infrastructure Security, Kubernetes, Network Security, Security Engineering, Security Controls, Firewall, Endpoint Security, Identity and Access Management, Security Strategy, Cyber Security Strategy, Infrastructure As A Service (IaaS), Authorization (Computing), Role-Based Access Control (RBAC), Cloud Services, Network Administration, Virtual Machines

Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging

Skills you'll gain: Exploit development, Penetration Testing, Cyber Operations, Malware Protection, Exploitation techniques, Network Monitoring, Object Oriented Programming (OOP), Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting Languages, Scripting, Remote Access Systems, Python Programming, Program Development, Command-Line Interface, Code Reusability, Package and Software Management
What brings you to Coursera today?

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, Vulnerability Scanning, Security Controls, Risk Management Framework

Skills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation

Skills you'll gain: Cryptography, Encryption, Android Development, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Application Security, Data Loss Prevention, Network Security, Exploitation techniques, Memory Management, File Systems

Skills you'll gain: File Systems, Operating Systems, File Management, Computer Programming Tools, Data Integrity, Debugging, File I/O, Systems Design, Data Storage Technologies, System Software, Distributed Computing, Data Storage, C (Programming Language), System Programming, Computer Systems, Data Persistence, Command-Line Interface, Hardware Architecture, Peripheral Devices, Data Security

Skills you'll gain: Transaction Processing, Data Persistence, Performance Tuning, System Programming, Memory Management, Operating Systems, C++ (Programming Language), C (Programming Language), System Configuration, Hardware Architecture, File Systems, Data Integrity, Computer Architecture, Data Storage, Computer Hardware, Data Storage Technologies, Application Development

Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cybersecurity, Cyber Threat Intelligence, Security Management, Security Awareness, Data Ethics, Data Security, Technical Communication, AI Workflows, Artificial Intelligence, Generative AI