More to explore:

All Results

  • Skills you'll gain: Networking Hardware, Network Security, TCP/IP, Network Protocols, Network Administration, Endpoint Security, Routing Protocols, Network Routing, Cybersecurity, Endpoint Detection and Response, Cyber Threat Intelligence, Firewall, Network Infrastructure, Network Architecture, Intrusion Detection and Prevention, Local Area Networks, General Networking, Dynamic Host Configuration Protocol (DHCP), Network Routers, Data Loss Prevention

  • Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, General Networking, Network Model, Network Infrastructure, Firewall, Security Controls, Cloud Computing, Virtual Private Networks (VPN)

  • Cisco Learning and Certifications

    Skills you'll gain: OSI Models, Network Security, Network Protocols, Network Architecture, Network Performance Management, Network Monitoring, Role-Based Access Control (RBAC), Network Troubleshooting, Network Administration, Computer Networking, TCP/IP, Network Planning And Design, Cybersecurity, Routing Protocols, Firewall, Network Routing, Network Analysis, IT Infrastructure, Cloud Computing, Automation

  • Akamai Technologies, Inc.

    Skills you'll gain: Routing Protocols, OSI Models, Remote Access Systems, Network Architecture, TCP/IP, General Networking, Network Protocols, Network Troubleshooting, Computer Networking, Networking Hardware, Network Administration, Network Security, Network Model, Virtual Private Networks (VPN), Wireless Networks, Network Routers, Network Routing, Dynamic Host Configuration Protocol (DHCP), Intrusion Detection and Prevention, Network Analysis

What brings you to Coursera today?

  • Skills you'll gain: Zero Trust Network Access, Network Security, Endpoint Security, General Networking, TCP/IP, Network Infrastructure, Firewall, Security Controls, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Encryption, Network Analysis

  • Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, IT Security Architecture, Network Security, Cybersecurity, Endpoint Detection and Response, Cyber Attacks, Cryptographic Protocols, Network Architecture, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Application Security, Data Security, Information Technology, Cyber Security Strategy, Authentications, Penetration Testing, Computer Security Incident Management

  • University of Colorado System

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies, Security Controls

  • Skills you'll gain: Information Technology, Computer Hardware, Cloud Computing, Network Troubleshooting, Software Installation, Technical Support and Services, Help Desk Support, Cybersecurity, Cloud Infrastructure, Cyber Attacks, Information Technology Operations, Hardware Troubleshooting, Data Storage, General Networking, Database Software, Operating Systems, Package and Software Management, Computer Security Awareness Training, Peripheral Devices, Project Management

  • University of London

    Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, ISO/IEC 27001, Threat Management, Cyber Governance, Risk Management Framework, Computer Security, Information Assurance, Security Controls, Enterprise Security, Data Integrity

  • Cisco Learning and Certifications

    Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Malware Protection, Network Monitoring, TCP/IP, Network Infrastructure, Network Protocols, Firewall, Computer Security, Network Analysis, Exploitation techniques, General Networking, Authorization (Computing), Web Applications, Security Controls, Identity and Access Management, Authentications