More to explore:

All Results

  • Status: Job Skills

    Skills you'll gain: Operating System Administration, Digital Forensics, Cyber Threat Hunting, Email Security, Incident Response, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Penetration Testing, Database Management, IT Security Architecture, Cyber Threat Intelligence, Interviewing Skills, Cybersecurity, Cyber Security Assessment

  • Status: Bestseller

    Skills you'll gain: Incident Response, Email Security, Digital Forensics, Network Security, Computer Security Incident Management, Cloud Computing Architecture, Incident Management, Business Continuity Planning, Penetration Testing, Cloud Services, Business Continuity, Security Controls, System Configuration, Generative AI, Data Storage, Peripheral Devices, Cybersecurity, Application Security, Information Technology, Cryptography

  • Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Linux, Linux Commands, Incident Response, Network Security, Cybersecurity, TCP/IP, Linux Administration, Network Protocols, Cloud Computing Architecture, Cloud Security, Cyber Attacks

  • Skills you'll gain: Digital Forensics, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Cyber Security Assessment, Brute-force attacks, Vulnerability Assessments, Security Awareness

  • Status: Job Skills

    Skills you'll gain: Azure Active Directory, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Threat Modeling, Vulnerability Management, Zero Trust Network Access, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Security Information and Event Management (SIEM), Authentications, Encryption, Penetration Testing, Secure Coding, Regulatory Requirements, Cloud Security, Cloud Computing, Active Directory, Operating Systems, Cybersecurity, Computer Security Incident Management

  • Status: Job Skills

    Skills you'll gain: Process Modeling, Process Mapping, Business Process Modeling, Process Analysis, Business Analysis, Data Storytelling, Business Analysis Tools, Business Process Improvement, Feasibility Studies, Systems Analysis, Stakeholder Analysis, Process Optimization, Requirements Management, Business Systems Analysis, Systems Design, Communication Planning, Test Planning, Information Technology, Database Management, Agile Methodology

What brings you to Coursera today?

  • Skills you'll gain: Email Security, Public Key Infrastructure, Encryption, Cryptography, IT Security Architecture, Network Security, Cybersecurity, Hardening, Endpoint Detection and Response, Data Security, Cryptographic Protocols, Network Architecture, Advanced Encryption Standard (AES), Key Management, Authorization (Computing), Cyber Attacks, Information Technology, Cyber Security Strategy, Penetration Testing, Computer Security Incident Management

  • Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Network Security, Threat Management, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Cyber Security Policies, Multi-Factor Authentication, Human Factors (Security)

  • Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Security Strategy, IT Security Architecture, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cyber Security Assessment, Network Security, Application Security, DevSecOps, Malware Protection, Security Management, Cloud Security, Encryption, Authentications

  • Skills you'll gain: Cyber Threat Intelligence, Vulnerability Assessments, Incident Response, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Threat Modeling, Threat Detection, Application Security, Malware Protection, Network Analysis, Encryption

  • Status: Job Skills

    Skills you'll gain: Threat Modeling, Network Security, Threat Management, Vulnerability Management, Intrusion Detection and Prevention, Hardening, Computer Security Incident Management, Security Management, Cyber Threat Intelligence, Security Awareness, Incident Response, Cybersecurity, Network Protocols, Endpoint Detection and Response, Bash (Scripting Language), Debugging, Linux, Web Presence, Python Programming, SQL

  • Status: Job Ready

    Skills you'll gain: Process Modeling, Risk Mitigation, Business Analysis, Data Storytelling, Risk Analysis, Business Analysis Tools, Project Scoping, Risk Management Framework, Process Flow Diagrams, Stakeholder Analysis, Prompt Engineering, Stakeholder Management, Data Presentation, Digital Transformation, Responsible AI, Business Process Modeling, Excel Formulas, Data Cleansing, Business Analytics, Business Requirements