More to explore:

All Results

  • Skills you'll gain: Digital Forensics, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Cyber Security Assessment, Brute-force attacks, Vulnerability Assessments, Security Awareness

  • Status: Job Skills

    Skills you'll gain: Operating System Administration, Digital Forensics, Cyber Threat Hunting, Email Security, Incident Response, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Penetration Testing, Database Management, IT Security Architecture, Cyber Threat Intelligence, Interviewing Skills, Cybersecurity, Cyber Security Assessment

  • Status: Job Ready

    Skills you'll gain: Process Modeling, Risk Mitigation, Business Analysis, Data Storytelling, Risk Analysis, Business Analysis Tools, Project Scoping, Risk Management Framework, Process Flow Diagrams, Stakeholder Analysis, Prompt Engineering, Stakeholder Management, Data Presentation, Digital Transformation, Responsible AI, Business Process Modeling, Excel Formulas, Data Cleansing, Business Analytics, Business Requirements

  • Skills you'll gain: Security Management, Risk Management, Risk Management Framework, Compliance Management, Enterprise Risk Management (ERM), Risk Control, Security Strategy, Cyber Governance, Risk Analysis, Governance, Cybersecurity, Regulatory Compliance, Security Controls, Law, Regulation, and Compliance, Regulation and Legal Compliance, Management Reporting, Cyber Security Policies, Cyber Security Strategy, Performance Reporting, Incident Response

  • Skills you'll gain: Email Security, Public Key Infrastructure, Encryption, Cryptography, IT Security Architecture, Network Security, Cybersecurity, Hardening, Endpoint Detection and Response, Data Security, Cryptographic Protocols, Network Architecture, Advanced Encryption Standard (AES), Key Management, Authorization (Computing), Cyber Attacks, Information Technology, Cyber Security Strategy, Penetration Testing, Computer Security Incident Management

  • Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Linux, Linux Commands, Incident Response, Network Security, Cybersecurity, TCP/IP, Linux Administration, Network Protocols, Cloud Computing Architecture, Cloud Security, Cyber Attacks

What brings you to Coursera today?

  • Status: Job Skills

    Skills you'll gain: Process Modeling, Process Mapping, Business Process Modeling, Process Analysis, Business Analysis, Data Storytelling, Business Analysis Tools, Business Process Improvement, Feasibility Studies, Systems Analysis, Stakeholder Analysis, Process Optimization, Requirements Management, Business Systems Analysis, Systems Design, Communication Planning, Test Planning, Information Technology, Database Management, Agile Methodology

  • Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Vulnerability Management, Development Environment, Security Controls, DevOps, Data Security, Software Development Life Cycle

  • Skills you'll gain: Email Security, Cloud Computing Architecture, Cloud Services, Cloud Deployment, Generative AI, Cloud Security, Cloud Technologies, Generative AI Agents, Cloud Infrastructure, Cybersecurity, Hardening, Data Storage, Peripheral Devices, Virtualization, Computer Hardware, OSI Models, General Networking, Database Administration, Programming Principles, Computer Programming

  • University of Colorado System

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies

  • Status: Job Skills

    Skills you'll gain: Azure Active Directory, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Threat Modeling, Vulnerability Management, Zero Trust Network Access, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Security Information and Event Management (SIEM), Authentications, Encryption, Penetration Testing, Secure Coding, Regulatory Requirements, Cloud Security, Cloud Computing, Active Directory, Operating Systems, Cybersecurity, Computer Security Incident Management

  • Status: Job Skills

    Skills you'll gain: Data Storytelling, Dashboard Creation, Data Presentation, Data Wrangling, Generative AI, Plotly, Data Visualization Software, Web Scraping, Data Visualization, Exploratory Data Analysis, SQL, Plot (Graphics), Dashboard, Interactive Data Visualization, Data Analysis, Professional Networking, IBM Cognos Analytics, Excel Formulas, Python Programming, Microsoft Excel