All Results

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, LLM Application, Cybersecurity, Routing Protocols, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Intrusion Detection and Prevention, Security Controls, Threat Detection, Network Analysis, Internet Of Things, AI Integrations

Skills you'll gain: Enterprise Risk Management (ERM), IT Management, Business Continuity, Data Security, Business Continuity Planning, Disaster Recovery, Audit Planning, Information Technology, Risk Management, Data Validation, Data Management, Compliance Management, Risk Mitigation, Data Governance, Technology Strategies, Information Assurance, Security Controls, Law, Regulation, and Compliance, Project Risk Management, Auditing

University of California, Santa Barbara
Skills you'll gain: Internal Controls, Financial Auditing, Auditing, Certified Public Accountant, Generally Accepted Auditing Standards, Audit Planning, Public Accounting, Risk Analysis, External Auditing, Regulatory Affairs, Client Services, Ethical Standards And Conduct

Microsoft
Skills you'll gain: Microsoft Power Platform, Excel Formulas, Process Flow Diagrams, Business Process Modeling, User Story, Business Requirements, Stakeholder Management, Data Modeling, Process Modeling, Microsoft Excel, Software Development Life Cycle, Requirements Analysis, Requirements Elicitation, Quality Management, Diagram Design, Microsoft Visio, Power BI, Stakeholder Engagement, Business Analysis, Data Analysis

Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Security Strategy, IT Security Architecture, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cyber Security Assessment, Network Security, Application Security, DevSecOps, Malware Protection, Security Management, Cloud Security, Encryption, Authentications

Skills you'll gain: Operating System Administration, Digital Forensics, Cyber Threat Hunting, Incident Response, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Penetration Testing, Linux, Database Management, IT Security Architecture, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
What brings you to Coursera today?

Microsoft
Skills you'll gain: Azure Active Directory, MITRE ATT&CK Framework, Threat Modeling, Penetration Testing, Zero Trust Network Access, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Authentications, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Regulatory Requirements, Cloud Security, Cloud Computing, Business Software, Active Directory, Computer Security Incident Management

LearnKartS
Skills you'll gain: Risk Management, Risk Analysis, Risk Management Framework, Risk Modeling, Security Management, Risk Appetite, Business Risk Management, Cyber Risk, Risk Mitigation, Threat Management, Enterprise Risk Management (ERM), Risk Control, Vulnerability Assessments, Threat Modeling, Vulnerability Management, Threat Detection, Security Controls, Stakeholder Communications, Vulnerability, Stakeholder Engagement

John Wiley & Sons
Skills you'll gain: Cyber Threat Intelligence, Incident Response, Computer Security Incident Management, Security Management, Security Controls, Incident Management, Business Continuity Planning, Threat Management, Risk Management, Threat Detection, Risk Management Framework, Disaster Recovery, Cybersecurity, Security Testing, Cyber Security Strategy, IT Security Architecture, Security Strategy, Compliance Management, Security Awareness, Business Continuity

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Encryption, Information Systems Security, Threat Modeling, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Threat Management, Application Security, Data Security, Computer Security, Security Management, Network Security, Incident Response, Data Encryption Standard, Cyber Security Policies, Cryptography, Intrusion Detection and Prevention, Security Controls, Data Integrity, Authentications

Skills you'll gain: Audit Planning, Service Level Agreement, Data Governance, Systems Development Life Cycle, Data Loss Prevention, Security Testing, Network Security, Software Development Life Cycle, IT Management, Systems Development, Incident Management, IT General Controls (ITGC), Problem Management, Control Objectives for Information and Related Technology (COBIT), Cryptography, Cloud Management, Generally Accepted Auditing Standards, Software Development Methodologies, Auditing, Internal Controls

Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Linux, Linux Commands, Incident Response, Network Security, Cybersecurity, TCP/IP, Linux Administration, Network Protocols, Cloud Computing Architecture, Computer Security Incident Management, Cyber Attacks