More to explore:

All Results

  • Skills you'll gain: Cybersecurity, Cyber Operations, Data Persistence, Exploitation techniques, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Scripting Languages

  • Skills you'll gain: Penetration Testing, Exploitation techniques, Scenario Testing, Cybersecurity, Vulnerability Assessments, Linux Administration, Linux Servers, Linux, Command-Line Interface, Linux Commands, Cryptography, File Management, Microsoft Windows, Unix Shell, Virtual Machines

  • Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)

  • Skills you'll gain: Microsoft Azure, Application Security, Cloud Security, IT Security Architecture, Infrastructure Security, Kubernetes, Network Security, Security Engineering, Security Controls, Firewall, Endpoint Security, Identity and Access Management, Security Strategy, Cyber Security Strategy, Infrastructure As A Service (IaaS), Authorization (Computing), Role-Based Access Control (RBAC), Cloud Services, Network Administration, Virtual Machines

  • Skills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation

  • Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging

What brings you to Coursera today?

  • Skills you'll gain: Exploit development, Penetration Testing, Cyber Operations, Malware Protection, Exploitation techniques, Network Monitoring, Object Oriented Programming (OOP), Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting Languages, Scripting, Remote Access Systems, Python Programming, Program Development, Command-Line Interface, Code Reusability, Package and Software Management

  • Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, Vulnerability Scanning, Security Controls, Risk Management Framework

  • Skills you'll gain: Cryptography, Encryption, Android Development, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Application Security, Data Loss Prevention, Network Security, Exploitation techniques, Memory Management, File Systems

  • Skills you'll gain: File Systems, Operating Systems, File Management, Computer Programming Tools, Data Integrity, Debugging, File I/O, Systems Design, Data Storage Technologies, System Software, Distributed Computing, Data Storage, C (Programming Language), System Programming, Computer Systems, Data Persistence, Command-Line Interface, Hardware Architecture, Peripheral Devices, Data Security

  • Skills you'll gain: Transaction Processing, Data Persistence, Performance Tuning, System Programming, Memory Management, Operating Systems, C++ (Programming Language), C (Programming Language), System Configuration, Hardware Architecture, File Systems, Data Integrity, Computer Architecture, Data Storage, Computer Hardware, Data Storage Technologies, Application Development

  • Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cybersecurity, Cyber Threat Intelligence, Security Management, Security Awareness, Data Ethics, Data Security, Technical Communication, AI Workflows, Artificial Intelligence, Generative AI