More to explore:

All Results

  • Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Network Analysis

  • Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning

  • Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, System Configuration, Digital Forensics

  • Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, IT Security Architecture, Network Security, Cybersecurity, Endpoint Detection and Response, Cyber Attacks, Cryptographic Protocols, Network Architecture, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Application Security, Data Security, Information Technology, Cyber Security Strategy, Authentications, Penetration Testing, Computer Security Incident Management

  • Skills you'll gain: Digital Forensics, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Cyber Security Assessment, Brute-force attacks, Vulnerability Assessments, Security Awareness

  • Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Exploit development, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Security Testing, Scripting, Vulnerability Assessments, Hardening, Brute-force attacks, General Networking, Scripting Languages, Shell Script, Network Administration, Cybersecurity, Network Security

What brings you to Coursera today?

  • Skills you'll gain: Penetration Testing, Metasploit, Exploitation techniques, Cloud Security, Vulnerability Scanning, Cyber Security Assessment, Network Security, Application Security, Vulnerability Assessments, Cybersecurity, Mobile Security, Human Factors (Security), Network Analysis, Scripting, Virtual Machines, Linux, Technical Communication

  • Skills you'll gain: Data Ethics, Prompt Engineering, AI literacy, Responsible AI, Data Synthesis, Personally Identifiable Information, LLM Application, Information Privacy, Large Language Modeling, Qualitative Research, Data Integrity, Performance Analysis, Key Performance Indicators (KPIs), Performance Measurement, Variance Analysis, Gap Analysis, Market Opportunities, Business Development, Business Strategy, Business Planning

  • Skills you'll gain: Operating System Administration, Digital Forensics, Cyber Threat Hunting, Incident Response, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Penetration Testing, Linux, Database Management, IT Security Architecture, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment

  • LearnKartS

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Vulnerability Scanning, Security Testing, Cyber Security Assessment, Cybersecurity, Network Security, Cyber Attacks, Cryptography, Kubernetes, Application Security, Cloud Infrastructure, Cloud Applications, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Threat Hunting, Security Controls, Security Awareness, Cyber Risk, Security Strategy

  • Skills you'll gain: Open Web Application Security Project (OWASP), AI Security, Vulnerability Assessments, Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

  • Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Network Security, Cryptography, Threat Management, Information Systems Security, Threat Detection, Cloud Security