More to explore:

All Results

  • Skills you'll gain: Threat Management, Microsoft Azure, Cloud Security, Threat Detection, Key Management, Security Controls, Data Security, Data Structures, Role-Based Access Control (RBAC), Continuous Monitoring, Event Monitoring, Query Languages

  • Skills you'll gain: Security Information and Event Management (SIEM), Azure Active Directory, Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cyber Attacks, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Firewall, Computer Security Incident Management, Endpoint Security, Cloud Standards, Threat Detection, Event Management

  • Skills you'll gain: Azure Active Directory, Endpoint Security

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cyber Security Policies, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Cyber Threat Intelligence, Identity and Access Management, Network Security, Endpoint Detection and Response, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Intrusion Detection and Prevention, Event Management

  • Skills you'll gain: MITRE ATT&CK Framework, Endpoint Security, Cyber Threat Hunting, Cyber Threat Intelligence, Endpoint Detection and Response, Cloud Solutions, Cloud Security, Threat Detection, Cyber Operations, Threat Management, Microsoft Copilot, Malware Protection, Security Information and Event Management (SIEM), AI Security, Microsoft Azure, Vulnerability Management, Cloud Computing, Incident Response, Hybrid Cloud Computing, AI Integrations

  • Skills you'll gain: Microsoft SQL Servers, Data Security, Microsoft Azure, Cloud Security, Databases, Database Management, Data Management, Data Access, Security Controls, Authorization (Computing), Role-Based Access Control (RBAC)

What brings you to Coursera today?

  • Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Security Controls, Threat Detection, Threat Management, Application Performance Management, Cyber Security Policies, Event Monitoring, Brute-force attacks, Incident Response, Query Languages, Interactive Data Visualization

  • Skills you'll gain: Microsoft Azure, Application Security, Cloud Security, IT Security Architecture, Infrastructure Security, Kubernetes, Network Security, Security Engineering, Security Controls, Firewall, Endpoint Security, Identity and Access Management, Security Strategy, Cyber Security Strategy, Infrastructure As A Service (IaaS), Authorization (Computing), Role-Based Access Control (RBAC), Cloud Services, Network Administration, Virtual Machines

  • Skills you'll gain: Microsoft Azure, Identity and Access Management, Network Security, Cloud Management, Cloud Security, Security Management, Data Storage, Security Information and Event Management (SIEM), Firewall, Role-Based Access Control (RBAC), Security Controls, Continuous Monitoring, Key Management, Computer Security Incident Management, Incident Response, Threat Detection, Virtual Machines, Incident Management

  • Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Security Software, Cloud Platforms, Azure Active Directory, Cloud Security, Endpoint Detection and Response, Security Controls, Cloud Services, Cloud Computing, Identity and Access Management, Enterprise Security, Data Governance, Infrastructure Security, Encryption

  • Skills you'll gain: IT Security Architecture, Endpoint Security, Zero Trust Network Access, Application Security, Security Strategy, Hardening, Microsoft Servers, Data Security, Security Management, Vulnerability Scanning, Patch Management

  • Skills you'll gain: User Provisioning, Azure Active Directory, Cloud Security, Microsoft Azure, Security Information and Event Management (SIEM), Identity and Access Management, Role-Based Access Control (RBAC), IT Security Architecture, Security Controls, Multi-Factor Authentication, Authentications, Continuous Monitoring, Key Management, Threat Detection, Incident Response, General Data Protection Regulation (GDPR), Automation