More to explore:

All Results

  • Skills you'll gain: Incident Response, Hybrid Cloud Computing, Zero Trust Network Access, Incident Management, Computer Security Incident Management, Security Information and Event Management (SIEM), Endpoint Detection and Response, Containerization, Event Monitoring, Enterprise Security, Telecommunications, Cybersecurity, Threat Detection, Security Controls, Network Security, Network Architecture

  • Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Security Controls, Enterprise Security, Network Protocols, Proxy Servers

  • Skills you'll gain: Cyber Threat Hunting, Splunk, Threat Detection, Jupyter, Anomaly Detection, Threat Management, Cybersecurity, Data Analysis, Data Science, Data Wrangling, Applied Machine Learning, Security Information and Event Management (SIEM), Data Cleansing, Data Transformation, Data Preprocessing, MLOps (Machine Learning Operations), Unsupervised Learning, Automation

  • Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, Computer Security Incident Management, IT Security Architecture, Cloud Security, Security Architecture Review, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Malware Protection, Cyber Attacks, Risk Management

  • Johns Hopkins University

    Skills you'll gain: Intrusion Detection and Prevention, Model Evaluation, Incident Response, Threat Detection, Computer Security Incident Management, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Incident Management, Threat Management, Model Training, Continuous Monitoring, Cyber Security Policies, System Monitoring, AI Security, Virtual Machines, Network Security, Machine Learning Methods, Network Analysis, Data Analysis

  • Johns Hopkins University

    Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Fraud detection, Model Evaluation, Malware Protection, Cybersecurity, Threat Detection, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Classification Algorithms, Email Security, Network Security, Jupyter, Authentications, Machine Learning Methods, Machine Learning Algorithms, Artificial Intelligence

What brings you to Coursera today?

  • Skills you'll gain: Penetration Testing, Metasploit, Safety Culture, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Security Assessment, Cybersecurity, Threat Detection, Generative AI, Security Testing, Vulnerability Scanning, Anomaly Detection, Data Security, Security Strategy, Network Security, Security Software, Change Management, Machine Learning Methods, Ethical Standards And Conduct, Data Visualization

  • Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Security Strategy, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Security Testing, IT Security Architecture, Cyber Attacks, Security Information and Event Management (SIEM), Cyber Engineering, Patch Management, Network Security, Malware Protection, Security Management, Digital Forensics, Risk Analysis

  • Skills you'll gain: Cyber Threat Intelligence, Intelligence Collection and Analysis, Cyber Threat Hunting, MITRE ATT&CK Framework, Threat Modeling, Threat Detection, Threat Management, AI Security, Responsible AI, Malware Protection, Cybersecurity, Requirements Analysis, Technical Communication

  • Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Incident Management, Cyber Threat Intelligence, Continuous Monitoring, Security Controls, Network Security, Network Monitoring, Splunk, Network Analysis, TCP/IP, Network Protocols, Document Management, Query Languages

  • Skills you'll gain: Cloud Security, AWS Identity and Access Management (IAM), Identity and Access Management, Cloud Computing, Security Information and Event Management (SIEM), Cloud Deployment, Cloud Computing Architecture, Cloud Management, Secure Coding, Threat Detection, Cloud Solutions, Cloud Infrastructure, Network Security, Application Security, Data Security, Encryption, Event Monitoring, Security Testing, Cloud Applications, Data Encryption Standard

  • Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Security Awareness, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Security Strategy, Cyber Risk, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Identity and Access Management, Data Management, Cryptography