More to explore:

All Results

  • Skills you'll gain: Penetration Testing, Exploitation techniques, Scenario Testing, Cybersecurity, Vulnerability Assessments, Linux Administration, Linux Servers, Linux, Command-Line Interface, Linux Commands, Cryptography, File Management, Microsoft Windows, Unix Shell, Virtual Machines

  • Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Assessments, Security Testing, Data Security, Cybersecurity, Exploitation techniques, Test Tools, Cyber Security Strategy, Security Controls, Authorization (Computing), Technical Documentation, Computing Platforms, Requirements Analysis, Technical Communication, Document Management

  • Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Security Testing, Security Controls, Brute-force attacks, Virtual Environment, Cybersecurity, Virtual Machines, Technical Writing, Technical Documentation, Linux

  • Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Exploitation techniques, Test Tools, Virtual Machines, Technical Documentation, Microsoft Windows, Scripting

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Security Testing, Hardening, Test Script Development, Brute-force attacks, Business Logic, Cloud Security, Network Analysis, Programming Principles, API Testing, General Data Protection Regulation (GDPR), Cloud Computing, Wireless Networks, Data Persistence, Application Programming Interface (API), Data Security

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Metasploit, Exploitation techniques, Exploit development, Vulnerability Scanning, Security Testing, Technical Communication, Scripting, Technical Writing, Security Engineering, Technical Documentation, Bash (Scripting Language), Code Review, Security Requirements Analysis, Windows PowerShell, Security Awareness, Python Programming, Linux, Persistence, Applicant Tracking Systems

What brings you to Coursera today?

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Security Testing, MITRE ATT&CK Framework, Test Planning, Cyber Threat Intelligence, Open Web Application Security Project (OWASP), Regulatory Compliance, Risk Management Framework, Scope Management, Network Analysis, Technical Communication, Drive Engagement, OSI Models, Ethical Standards And Conduct

  • Skills you'll gain: Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Network Protocols, Network Analysis, Network Monitoring, Image Analysis, Virtual Machines, Virtualization and Virtual Machines, Virtual Environment, Open Source Technology, Malware Protection, Command-Line Interface, Software Installation, File Management, Microsoft Windows

  • Status: New

    Skills you'll gain: Penetration Testing, Metasploit, Exploitation techniques, Cloud Security, Vulnerability Scanning, Security Testing, Network Security, Application Security, Vulnerability Assessments, Cybersecurity, Mobile Security, Wireless Networks, Human Factors (Security), Network Analysis, Linux, Technical Communication

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cybersecurity, Cryptography, Cryptographic Protocols, Exploitation techniques, Security Testing, Encryption, Technical Writing, Test Tools, Human Factors (Security), Technical Communication

  • Skills you'll gain: Penetration Testing, Vulnerability Scanning, Exploitation techniques, Cyber Security Assessment, Security Testing, Vulnerability Assessments, Mobile Security, Vulnerability Management, Cloud Security, Network Security, Business Logic

  • Status: New
    Status: Free Trial

    Total Seminars

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Metasploit, Vulnerability Assessments, Exploitation techniques, Cyber Security Assessment, Exploit development, Network Security, Cybersecurity, Vulnerability Management, Brute-force attacks, Security Testing, MITRE ATT&CK Framework, Test Planning, Cloud Security, Network Analysis, OSI Models, Linux, Web Applications, Ethical Standards And Conduct