All Results

Skills you'll gain: Windows PowerShell, Active Directory, Scripting, IT Automation, Network Monitoring, Scripting Languages, Microsoft Windows, Windows Servers, Shell Script, User Accounts, Microsoft Servers, Command-Line Interface, Network Administration, Remote Access Systems, Servers, Systems Administration, User Interface (UI), UI Components, Server Administration, Authentications

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Cyber Security Strategy, Security Testing, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Linux, Linux Administration

Skills you'll gain: Traffic Flow Optimization, Construction Inspection, Building Codes, Construction Engineering, Construction, Construction Management, Civil Engineering, Stormwater Management, General Construction and Construction Labor, Structural Engineering, Hydrology, Hydraulics, Grading (Landscape), Public Works, Design Specifications, Structural Analysis, Materials science, Engineering Plans And Specifications, Engineering Practices, Failure Analysis

Skills you'll gain: Penetration Testing, Security Testing, Hardening, Test Script Development, Brute-force attacks, Business Logic, Cloud Security, Network Analysis, Programming Principles, API Testing, General Data Protection Regulation (GDPR), Cloud Computing, Wireless Networks, Data Persistence, Application Programming Interface (API), Data Security

Skills you'll gain: Canva (Software), AI powered creativity, Generative AI, Content Creation, Social Media Content, ChatGPT, AI Integrations, Graphic and Visual Design, Prompt Engineering, Content Development and Management, Content Marketing, Writing, Digital Marketing Tools

The State University of New York
Skills you'll gain: Business Strategy, Training and Development, Training Programs, Lifelong Learning, Strategic Decision-Making, Professional Development, Personal Development, Performance Measurement, Needs Assessment, Dashboard, Self-Awareness, Benchmarking, Performance Metric, Willingness To Learn, Program Standards, Job Analysis, Portfolio Management, Gap Analysis, Information Management, Information Systems
What brings you to Coursera today?

Skills you'll gain: Virtual Local Area Network (VLAN), Network Planning And Design, Network Protocols, Network Architecture, Network Administration, Routing Protocols, System Configuration, Network Routers, Local Area Networks, Network Infrastructure, Network Troubleshooting, Network Switches, General Networking, Computer Networking, Dynamic Host Configuration Protocol (DHCP), Data Centers, Network Routing, Network Security

Skills you'll gain: Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Vulnerability Assessments, Vulnerability Scanning, Security Testing

Skills you'll gain: Network Troubleshooting, Network Protocols, Network Monitoring, Network Analysis, TCP/IP, Cyber Security Assessment, Network Security, User Interface (UI)

University of Virginia
Skills you'll gain: Business Strategy, Competitive Analysis, Strategic Thinking, Business Strategies, Stakeholder Analysis, Corporate Strategy, Strategic Decision-Making, Stakeholder Management, Organizational Strategy, Market Analysis, Case Studies, Growth Strategies, Risk Analysis, Innovation

University of Colorado Boulder
Skills you'll gain: Real-Time Operating Systems, Systems Architecture, Software Architecture, Embedded Software, Software Design, System Design and Implementation, Embedded Systems, Performance Tuning, Systems Analysis, Electronic Hardware, Hardware Design, Electronic Systems, Systems Design, Hardware Architecture, Electrical and Computer Engineering, Requirements Analysis, System Programming, Reliability, Operating Systems, Service Level

Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Human Factors (Security), Information Systems Security, Data Persistence