All Results

Skills you'll gain: Incident Response, Cyber Security Strategy, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Cyber Attacks, Information Systems Security, Metasploit, Security Strategy, Infrastructure Security, Incident Management, Vulnerability Scanning, Security Testing, Hardening, Security Controls, Penetration Testing, Mobile Security

Fortinet, Inc.
Skills you'll gain: Virtual Private Networks (VPN), Firewall, Network Routing, Routing Protocols, Intrusion Detection and Prevention, Authentications, Lightweight Directory Access Protocols, Remote Access Systems, Network Security, Network Administration, Virtual Networking, Cyber Security Policies, Security Controls, User Accounts, System Configuration, Network Monitoring

Skills you'll gain: Cyber Threat Intelligence, Threat Modeling, MITRE ATT&CK Framework, Threat Detection, Threat Management, Intelligence Collection and Analysis, Report Writing, Technical Communication, Cyber Security Strategy, Cybersecurity, Research Reports, Data Storytelling, Oral Expression, Verbal Communication Skills, Incident Response, Risk Analysis, Communication, Infrastructure Security, Analysis, Stakeholder Communications

Skills you'll gain: Knowledge of Apple Software, Apple Service Certification, Application Lifecycle Management, Endpoint Security, Knowledge of Apple Hardware, Release Management

Skills you'll gain: Network Security, Wireless Networks, Network Performance Management, Network Monitoring, Dynamic Host Configuration Protocol (DHCP), Ansible, Network Administration, Software-Defined Networking, Local Area Networks, Network Protocols, Infrastructure as Code (IaC), Terraform, Configuration Management, Encryption, Authentications

Skills you'll gain: Cloud Security, Intrusion Detection and Prevention, Email Security, Incident Response, Application Security, Cloud Computing, Computer Security Incident Management, Cyber Attacks, Threat Detection, Web Applications, Malware Protection, Threat Management, Security Information and Event Management (SIEM), Network Monitoring, Digital Forensics
What brings you to Coursera today?

Starweaver
Skills you'll gain: Cyber Threat Intelligence, Intelligence Collection and Analysis, Cyber Threat Hunting, MITRE ATT&CK Framework, Threat Modeling, Threat Detection, Threat Management, AI Security, Responsible AI, Malware Protection, Cybersecurity, Requirements Analysis, Technical Communication

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Security Assessment, Cybersecurity, Operating System Administration, Operating Systems, Hardening, Computer Security, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Identity and Access Management, Memory Management, Data Persistence, Computer Architecture

Skills you'll gain: Remote Access Systems, Security Management, Data Security, Law, Regulation, and Compliance, Cybersecurity, Vulnerability Management, Computer Security Awareness Training, Incident Response, Security Software, Incident Management, Continuous Monitoring, End User Training and Support, Human Factors (Security), Security Awareness, General Data Protection Regulation (GDPR), System Implementation, Human Factors

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Federal Information Security Management Act, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, System Monitoring, Security Requirements Analysis, System Implementation, Change Requests, Cyber Security Assessment, Security Testing, Risk Mitigation, Document Management

Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Threat Management, Cybersecurity, Computer Security Incident Management, IT Security Architecture, Cloud Security, Security Architecture Review, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Risk Management

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Security Awareness, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Security Strategy, Cyber Risk, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Identity and Access Management, Data Management, Cryptography