All Results
Status: Job SkillsGoogle
Skills you'll gain: Threat Modeling, Network Security, Threat Management, Vulnerability Management, Intrusion Detection and Prevention, Hardening, Computer Security Incident Management, Security Management, Cyber Threat Intelligence, Security Awareness, Incident Response, Cybersecurity, Network Protocols, Endpoint Detection and Response, Bash (Scripting Language), Debugging, Linux, Web Presence, Python Programming, SQL

Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Network Security, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis

Skills you'll gain: Network Security, Incident Response, Incident Management, Business Continuity Planning, Business Continuity, Disaster Recovery, Security Controls, System Configuration, Configuration Management, Governance, Cyber Operations, Cybersecurity, Security Awareness, Security Management, Computer Security Incident Management, Cyber Attacks, Computer Security Awareness Training, Information Assurance, Data Security, Role-Based Access Control (RBAC)

Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cyber Operations, Cryptography, Cyber Security Assessment, Information Systems Security, Cyber Risk, Encryption, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Governance, Security Management, Cyber Security Policies, Infrastructure Security, Security Awareness, Cryptographic Protocols

Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Service Management, IT Management, Responsible AI, Compliance Auditing, Cyber Risk, Data Ethics, Cyber Governance, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Regulation and Legal Compliance, Compliance Management, Law, Regulation, and Compliance, Cyber Security Assessment, ISO/IEC 27001, Risk Management

Skills you'll gain: Cyber Security Assessment, Cybersecurity, Simulations, Scenario Testing, Security Testing, Security Controls, Vulnerability Management, Incident Response
What brings you to Coursera today?

Skills you'll gain: Cybersecurity, Information Technology, Cyber Security Strategy, Penetration Testing, Cyber Security Policies, Technical Support and Services, Incident Response, Computer Security Awareness Training, Security Awareness, Vulnerability Assessments, Network Security, Data Security, Information Assurance, Cloud Security, Operating Systems, Computer Hardware

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Cyber Attacks, Encryption, Key Management, Multi-Factor Authentication, Single Sign-On (SSO)

Skills you'll gain: Record Keeping, Regulatory Requirements, Cloud Security, Regulatory Compliance, Data Management, Regulation and Legal Compliance, Data Maintenance, Cloud Computing Architecture, Records Management, Compliance Management, IT Security Architecture, Cloud Management, Cloud Standards, Security Management, Cloud Computing, Cyber Security Policies, Microsoft Azure, Compliance Reporting, Data Security, Threat Management

Skills you'll gain: Cybersecurity, Cloud Computing, Network Monitoring, Command-Line Interface, Cloud Services, General Networking, Linux Commands, Linux, Virtual Machines

28DIGITAL
Skills you'll gain: Cybersecurity, Threat Modeling, Cyber Attacks, Information Systems Security, Security Management, Cyber Security Strategy, Cyber Threat Intelligence, Threat Management, Cyber Risk, Cyber Security Assessment, Network Security, Risk Management, Risk Analysis, Data Security, Exploitation techniques, Information Privacy, Vulnerability Assessments, Business Economics

Board Infinity
Skills you'll gain: Risk Management Framework, Business Continuity Planning, Incident Response, Risk Mitigation, Cyber Threat Hunting, Cyber Risk, Business Continuity, Risk Management, Computer Security Incident Management, Risk Analysis, Threat Management, Cybersecurity, Vulnerability Management, Security Management, Enterprise Risk Management (ERM), Network Security, Cyber Security Policies, Incident Management, Operational Risk, Business Risk Management