More to explore:

All Results

  • Johns Hopkins University

    Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, LLM Application, Cybersecurity, Routing Protocols, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Intrusion Detection and Prevention, Security Controls, Threat Detection, Network Analysis, Internet Of Things, AI Integrations

  • Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Security Strategy, IT Security Architecture, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cyber Security Assessment, Network Security, Application Security, DevSecOps, Malware Protection, Security Management, Cloud Security, Encryption, Authentications

  • University of California, Santa Barbara

    Skills you'll gain: Internal Controls, Financial Auditing, Auditing, Certified Public Accountant, Generally Accepted Auditing Standards, Audit Planning, Public Accounting, Risk Analysis, External Auditing, Regulatory Affairs, Client Services, Ethical Standards And Conduct

  • Skills you'll gain: Enterprise Risk Management (ERM), IT Management, Business Continuity, Data Security, Business Continuity Planning, Disaster Recovery, Audit Planning, Information Technology, Risk Management, Data Validation, Data Management, Compliance Management, Risk Mitigation, Data Governance, Technology Strategies, Information Assurance, Security Controls, Law, Regulation, and Compliance, Project Risk Management, Auditing

  • Skills you'll gain: Cyber Threat Intelligence, Incident Response, Computer Security Incident Management, Security Management, Security Controls, Incident Management, Business Continuity Planning, Threat Management, Risk Management, Threat Detection, Risk Management Framework, Disaster Recovery, Cybersecurity, Security Testing, Cyber Security Strategy, IT Security Architecture, Security Strategy, Compliance Management, Security Awareness, Business Continuity

  • Skills you'll gain: Microsoft Power Platform, Excel Formulas, Process Flow Diagrams, Business Process Modeling, User Story, Business Requirements, Stakeholder Management, Data Modeling, Process Modeling, Microsoft Excel, Software Development Life Cycle, Requirements Analysis, Requirements Elicitation, Quality Management, Diagram Design, Microsoft Visio, Power BI, Stakeholder Engagement, Business Analysis, Data Analysis

What brings you to Coursera today?

  • Skills you'll gain: Azure Active Directory, MITRE ATT&CK Framework, Threat Modeling, Penetration Testing, Zero Trust Network Access, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Authentications, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Regulatory Requirements, Cloud Security, Cloud Computing, Business Software, Active Directory, Computer Security Incident Management

  • Skills you'll gain: Security Engineering, Security Requirements Analysis, Risk Management Framework, Systems Engineering, Information Systems Security Assessment Framework (ISSAF), System Implementation, Information Systems Security, Security Controls, Security Management, Information Assurance, Verification And Validation, Systems Development Life Cycle, Systems Integration, Change Control

  • Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Incident Management, Security Architecture Review, Application Security, Identity and Access Management, Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Security Strategy, Systems Architecture, Security Management, Security Engineering, Zero Trust Network Access, Security Awareness, Risk Management Framework, Cybersecurity, Enterprise Architecture

  • Skills you'll gain: Risk Management, Risk Analysis, Risk Management Framework, Risk Modeling, Security Management, Risk Appetite, Business Risk Management, Cyber Risk, Risk Mitigation, Threat Management, Enterprise Risk Management (ERM), Risk Control, Vulnerability Assessments, Threat Modeling, Vulnerability Management, Threat Detection, Security Controls, Stakeholder Communications, Vulnerability, Stakeholder Engagement

  • Skills you'll gain: Security Management, Security Controls, Asset Management, Security Strategy, IT Management, Program Management, Security Awareness, Computer Security Awareness Training, Cyber Security Strategy, IT Security Architecture, Information Management, Technology Roadmaps, Cyber Security Policies, Continuous Monitoring, Cybersecurity, Enterprise Security, Program Development, Vendor Management, Quality Management, Continuous Improvement Process

  • Skills you'll gain: Audit Planning, Service Level Agreement, Data Governance, Systems Development Life Cycle, Data Loss Prevention, Security Testing, Network Security, Software Development Life Cycle, IT Management, Systems Development, Incident Management, IT General Controls (ITGC), Problem Management, Control Objectives for Information and Related Technology (COBIT), Cryptography, Cloud Management, Generally Accepted Auditing Standards, Software Development Methodologies, Auditing, Internal Controls