All Results

Skills you'll gain: Threat Modeling, AI Security, DevSecOps, Security Testing, Continuous Monitoring, CI/CD, Threat Detection, DevOps, Continuous Integration, Test Script Development, API Testing, Endpoint Security, Scripting, Unit Testing, Scripting Languages, Exploitation techniques, Integration Testing, Data Validation

Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Cybersecurity, Data Preprocessing, Data Management, Data Quality, Technical Communication, Automation, Requirements Analysis

Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Cyber Threat Hunting, Computer Security Incident Management, Incident Response, Threat Detection, Incident Management

Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Threat Detection, Threat Management, Security Management, Cybersecurity, Scenario Testing, Technical Communication, Simulations

Universiteit Leiden
Skills you'll gain: Risk Management, Safety and Security, Security Management, Threat Management, Case Studies, Computer Security Incident Management, Public Safety and National Security, Risk Analysis, Cybersecurity, Incident Management, International Relations, Crisis Intervention, Policy Analysis, Governance, Public Policies

University of Maryland, College Park
Skills you'll gain: Risk Management Framework, Threat Management, Cyber Risk, Risk Management, Security Management, MITRE ATT&CK Framework, Security Awareness, Operational Risk, Risk Analysis, Business Risk Management, Human Factors (Security), Safety Culture, Risk Mitigation, Industrial and Organizational Psychology, Infrastructure Security, Threat Detection, Cyber Security Strategy, Cyber Security Policies, Organizational Leadership, Organizational Effectiveness
What brings you to Coursera today?

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning

Starweaver
Skills you'll gain: Cyber Threat Intelligence, Intelligence Collection and Analysis, Cyber Threat Hunting, MITRE ATT&CK Framework, Threat Modeling, Threat Detection, Threat Management, AI Security, Responsible AI, Malware Protection, Cybersecurity, Requirements Analysis, Technical Communication

Skills you'll gain: Prompt Engineering, Prompt Patterns, ChatGPT, Generative AI, Generative Model Architectures, Cyber Threat Intelligence, Security Information and Event Management (SIEM), AI Security, Threat Modeling, AI literacy, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Exploitation techniques, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Large Language Modeling, Vulnerability Management, Incident Management

Skills you'll gain: Operating System Administration, Digital Forensics, Cyber Threat Hunting, Incident Response, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Penetration Testing, Linux, Database Management, IT Security Architecture, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment

Skills you'll gain: Digital Forensics, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Cyber Security Assessment, Brute-force attacks, Vulnerability Assessments, Security Awareness

Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Security Strategy, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Security Testing, IT Security Architecture, Cyber Attacks, Security Information and Event Management (SIEM), Cyber Engineering, Patch Management, Network Security, Malware Protection, Security Management, Digital Forensics, Risk Analysis