More to explore:

All Results

  • L&T EduTech

    Skills you'll gain: Laboratory Testing, Laboratory Experience, Civil Engineering, Engineering Analysis, Experimentation, Building Codes, Research Reports, Structural Analysis, Analytical Testing, Engineering Practices, Failure Analysis, Test Equipment

  • Skills you'll gain: Threat Detection, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Operations, Cybersecurity, Interactive Data Visualization, Geospatial Information and Technology, IT Automation, Data Security, Security Awareness, Scripting, Network Analysis, Open Source Technology, Information Privacy

  • Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Incident Management, Cyber Threat Intelligence, Continuous Monitoring, Security Controls, Network Security, Network Monitoring, Splunk, Network Analysis, TCP/IP, Network Protocols, Document Management, Query Languages

  • Skills you'll gain: Security Information and Event Management (SIEM), Role-Based Access Control (RBAC), Dashboard Creation, Threat Detection, Incident Response, Data Import/Export, Identity and Access Management, Computer Security Incident Management, Data Integration, Data Modeling

  • Skills you'll gain: Operating System Administration, Digital Forensics, Cyber Threat Hunting, Email Security, Incident Response, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Penetration Testing, Database Management, IT Security Architecture, Cyber Threat Intelligence, Interviewing Skills, Cybersecurity, Cyber Security Assessment

  • Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness

What brings you to Coursera today?

  • Skills you'll gain: Self-Awareness, Independent Thinking, Liberal Arts, Personal Development, Psychology, Human Development, Research, Cultural Diversity, Meditation & Breathwork, Mindfulness, Ancient History

  • Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Threat Management, Cybersecurity, Endpoint Detection and Response, Cyber Attacks, Cyber Threat Intelligence, Digital Forensics, Intrusion Detection and Prevention, Threat Detection, Network Security, Network Monitoring, Data Security, Business Continuity, Network Analysis, Exploitation techniques, Malware Protection, Memory Management, Analysis

  • Skills you'll gain: Prompt Engineering, ChatGPT, Security Testing, Exploit development, Responsible AI, API Testing, AI Integrations, Data Ethics, Penetration Testing, OpenAI, Exploitation techniques, Vulnerability Scanning, Generative AI

  • Skills you'll gain: Epidemiology, Public Health, Public Health and Disease Prevention, Trend Analysis, Infection Control, Geographic Information Systems, Statistical Visualization, Health Policy, Data Visualization Software, Chronic Diseases, GIS Software, Geospatial Information and Technology, Infectious Diseases, Datamaps, Health Informatics, Risk Analysis, Investigation, Geospatial Mapping, Health Assessment, Statistics

  • Skills you'll gain: Digital Forensics, Incident Response, Computer Security Incident Management, Threat Detection, Incident Management, Cyber Threat Intelligence, Cybersecurity, Security Management, Data Integrity

  • Skills you'll gain: Mobile Security, Digital Forensics, Criminal Investigation and Forensics, Cyber Threat Intelligence, Cyber Security Strategy, Investigation, Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Mobile Development, Model Training, Cyber Security Policies, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Data Security, Cyber Governance, Endpoint Security, Machine Learning Methods, Application Security, iOS Development