More to explore:

All Results

  • Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning

  • Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Network Analysis

  • Skills you'll gain: Operating System Administration, Digital Forensics, Cyber Threat Hunting, Incident Response, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Penetration Testing, Linux, Database Management, IT Security Architecture, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment

  • Skills you'll gain: Penetration Testing, Metasploit, Exploitation techniques, Cloud Security, Vulnerability Scanning, Cyber Security Assessment, Network Security, Application Security, Vulnerability Assessments, Cybersecurity, Mobile Security, Human Factors (Security), Network Analysis, Scripting, Virtual Machines, Linux, Technical Communication

  • Skills you'll gain: Command-Line Interface, Virtualization and Virtual Machines, Network Security, Virtualization, Operating Systems, Hardware Troubleshooting, Information Technology Operations, Network Troubleshooting, Computer Hardware, Network Support, Cloud Computing, Mac OS, Security Controls, Microsoft Windows, Information Systems Security, System Configuration, Operating System Administration, Network Infrastructure, Data Storage, Peripheral Devices

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Security Testing, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Hardening, Linux, Linux Administration

What brings you to Coursera today?

  • Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Linux, Linux Commands, Incident Response, Network Security, Cybersecurity, TCP/IP, Linux Administration, Network Protocols, Cloud Computing Architecture, Computer Security Incident Management, Cyber Attacks

  • Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Vulnerability Management, Development Environment, Security Controls, DevOps, Data Security, Software Development Life Cycle

  • Skills you'll gain: User Story, Cloud Deployment, CI/CD, Open Web Application Security Project (OWASP), Continuous Integration, Istio, Test Driven Development (TDD), Application Deployment, Kubernetes, Devops Tools, Gherkin (Scripting Language), Jenkins, Agile Software Development, Scrum (Software Development), Test Tools, DevOps, Secure Coding, Grafana, System Monitoring, Agile Methodology

  • Skills you'll gain: Responsible AI, Generative Engine Optimization (GEO), Social Media Management, Social Media, Social Media Content, Social Media Marketing, Google Ads, Digital Marketing, Email Marketing, Social Media Strategy, Digital Advertising, Content Scheduling, Web Analytics and SEO, Digital Media Strategy, Online Advertising, Data-Driven Marketing, Customer Retention, Search Engine Optimization, Content Performance Analysis, Generative AI

  • Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, IT Security Architecture, Network Security, Cybersecurity, Endpoint Detection and Response, Cyber Attacks, Cryptographic Protocols, Network Architecture, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Application Security, Data Security, Information Technology, Cyber Security Strategy, Authentications, Penetration Testing, Computer Security Incident Management

  • Skills you'll gain: Prompt Engineering, Prompt Patterns, ChatGPT, Generative AI, Generative Model Architectures, Cyber Threat Intelligence, Security Information and Event Management (SIEM), AI Security, Threat Modeling, AI literacy, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Exploitation techniques, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Large Language Modeling, Vulnerability Management, Incident Management