More to explore:

All Results

  • Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Cyber Attacks, Vulnerability Assessments, Hardware Architecture, Information Systems Security, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, VPN Clients, Systems Architecture, Authentications

  • New York University

    Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Cyber Security Assessment

  • University of California, Irvine

    Skills you'll gain: Systems Development, Systems Development Life Cycle, Agile Methodology, Software Development Life Cycle, Productivity Software, Risk Management Framework, digital literacy, Systems Design, Network Security, Computer Hardware, Agile Project Management, Hardware Architecture, Agile Software Development, Computer Systems, Data Security, Risk Management, System Design and Implementation, TCP/IP, Information Technology, Productivity

  • Skills you'll gain: Business Software, Computer Hardware, Hardware Architecture, Generative AI, Operating Systems, Data Storage Technologies, Data Loss Prevention, Computer Systems, Data Maintenance, Enterprise Security, System Software, Information Technology, OS Process Management, Computer Architecture, Technology Solutions, Data Storage, Solution Architecture, System Configuration, Technical Support and Services, Cybersecurity

  • Skills you'll gain: IT Security Architecture, Incident Response, Computer Security Incident Management, Zero Trust Network Access, Cloud Computing Architecture, Authentications, Endpoint Detection and Response, Risk Analysis, Network Security, Compliance Training, Risk Mitigation, Risk Management Framework, Cyber Governance, Regulatory Compliance, Cloud Computing, Data Security, Application Security, Cyber Risk, Information Systems Security, Risk Management

  • University of Colorado System

    Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Risk Analysis, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Data Security, Authentications, Security Testing, Cloud Security, Security Strategy, Threat Management, Endpoint Detection and Response, Incident Management, Risk Management, Cyber Attacks

What brings you to Coursera today?

  • University of Colorado Boulder

    Skills you'll gain: Cybersecurity, Vulnerability Management, Multi-Factor Authentication, Linux

  • Akamai Technologies, Inc.

    Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Incident Management, Penetration Testing, Cybersecurity, Authentications, Cyber Attacks, Security Controls, Vulnerability Assessments, Encryption, Firewall, Threat Management, User Accounts, Identity and Access Management, Mobile Security, Risk Management

  • Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Authentications, Authorization (Computing), Application Security, Security Controls, Personally Identifiable Information, Security Awareness, Endpoint Security, Identity and Access Management, Information Privacy, Cryptography, Data Loss Prevention, Malware Protection, Hardening, Encryption, Vulnerability Assessments, Multi-Factor Authentication, Data Integrity

  • Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, General Networking, Network Model, Network Infrastructure, Firewall, Security Controls, Cloud Computing, Virtual Private Networks (VPN)

  • University of Colorado System

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies, Security Controls

  • Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Network Security, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis