All Results

L&T EduTech
Skills you'll gain: Laboratory Testing, Laboratory Experience, Civil Engineering, Engineering Analysis, Experimentation, Building Codes, Research Reports, Structural Analysis, Analytical Testing, Engineering Practices, Failure Analysis, Test Equipment

Skills you'll gain: Threat Detection, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Operations, Cybersecurity, Interactive Data Visualization, Geospatial Information and Technology, IT Automation, Data Security, Security Awareness, Scripting, Network Analysis, Open Source Technology, Information Privacy

Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Incident Management, Cyber Threat Intelligence, Continuous Monitoring, Security Controls, Network Security, Network Monitoring, Splunk, Network Analysis, TCP/IP, Network Protocols, Document Management, Query Languages

Skills you'll gain: Security Information and Event Management (SIEM), Role-Based Access Control (RBAC), Dashboard Creation, Threat Detection, Incident Response, Data Import/Export, Identity and Access Management, Computer Security Incident Management, Data Integration, Data Modeling

Skills you'll gain: Operating System Administration, Digital Forensics, Cyber Threat Hunting, Email Security, Incident Response, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Penetration Testing, Database Management, IT Security Architecture, Cyber Threat Intelligence, Interviewing Skills, Cybersecurity, Cyber Security Assessment

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness
What brings you to Coursera today?

The University of Edinburgh
Skills you'll gain: Self-Awareness, Independent Thinking, Liberal Arts, Personal Development, Psychology, Human Development, Research, Cultural Diversity, Meditation & Breathwork, Mindfulness, Ancient History

Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Threat Management, Cybersecurity, Endpoint Detection and Response, Cyber Attacks, Cyber Threat Intelligence, Digital Forensics, Intrusion Detection and Prevention, Threat Detection, Network Security, Network Monitoring, Data Security, Business Continuity, Network Analysis, Exploitation techniques, Malware Protection, Memory Management, Analysis

Skills you'll gain: Prompt Engineering, ChatGPT, Security Testing, Exploit development, Responsible AI, API Testing, AI Integrations, Data Ethics, Penetration Testing, OpenAI, Exploitation techniques, Vulnerability Scanning, Generative AI

Johns Hopkins University
Skills you'll gain: Epidemiology, Public Health, Public Health and Disease Prevention, Trend Analysis, Infection Control, Geographic Information Systems, Statistical Visualization, Health Policy, Data Visualization Software, Chronic Diseases, GIS Software, Geospatial Information and Technology, Infectious Diseases, Datamaps, Health Informatics, Risk Analysis, Investigation, Geospatial Mapping, Health Assessment, Statistics

Skills you'll gain: Digital Forensics, Incident Response, Computer Security Incident Management, Threat Detection, Incident Management, Cyber Threat Intelligence, Cybersecurity, Security Management, Data Integrity

Macquarie University
Skills you'll gain: Mobile Security, Digital Forensics, Criminal Investigation and Forensics, Cyber Threat Intelligence, Cyber Security Strategy, Investigation, Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Mobile Development, Model Training, Cyber Security Policies, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Data Security, Cyber Governance, Endpoint Security, Machine Learning Methods, Application Security, iOS Development