Security Controls

Security Controls are protective measures designed to mitigate or eliminate risks to the confidentiality, integrity, and availability of information systems and data. Coursera's Security Controls catalogue provides you with the knowledge to design, implement, and maintain security protocols in various information systems. You'll learn how to effectively manage and mitigate risks, apply encryption techniques, authenticate user access, and configure firewalls and intrusion detection systems. You'll understand the importance of continuous monitoring and incident response in ensuring the security of IT systems. This skill set will prepare you to tackle cybersecurity challenges in your current or future roles in the IT industry.
55credentials
340courses

Results for "security controls"

  • Status: New

    Skills you'll gain: Cybersecurity, Network Protocols, Threat Management, Threat Modeling, Security Controls, Responsible AI, Cyber Security Strategy, Cyber Security Policies, Secure Coding, Cyber Attacks, Mitigation, Security Awareness, Computer Security Awareness Training, Agile Methodology, Cyber Threat Intelligence, Network Security, TCP/IP, Incident Response, Threat Detection, Risk Management

  • Status: New
    Status: Preview

    Skills you'll gain: Cyber Governance, ISO/IEC 27001, Continuous Monitoring, NIST 800-53, Compliance Management, Cyber Risk, Cyber Security Policies, Incident Response, Cloud Security, Cybersecurity, Data Governance, Event Monitoring, Cloud Management, Security Controls, Risk Management Framework, IT Management, Information Privacy, Security Awareness

  • Status: Preview

    Kennesaw State University

    Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Business Continuity, Cryptography, Secure Coding, Systems Development Life Cycle, Security Controls, Law, Regulation, and Compliance, Infrastructure Security, Safety and Security, Identity and Access Management, Governance, Risk Management

  • Status: New
    Status: Preview

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Threat Management, Information Assurance, Security Controls, Cybersecurity, Cyber Security Strategy, Cyber Security Assessment, Endpoint Detection and Response, Security Information and Event Management (SIEM), Incident Response, Continuous Monitoring, Risk Management Framework, Technical Communication, Vulnerability Assessments, Data Integrity, Automation

  • Status: New

    Skills you'll gain: Cybersecurity, Computer Security Incident Management, Incident Response, Network Security, Information Systems Security, Security Information and Event Management (SIEM), Encryption, Security Controls, Infrastructure Security, Cyber Risk, TCP/IP, Cryptography, Vulnerability Management, Multi-Factor Authentication, Virtual Private Networks (VPN), Authentications, Operating Systems

  • Status: New

    Skills you'll gain: Responsible AI, LangChain, Threat Modeling, Generative AI, Application Security, Secure Coding, Large Language Modeling, Open Web Application Security Project (OWASP), Security Testing, Security Controls, Prompt Engineering, Data Security, Vulnerability Assessments, Computer Security

  • Status: New
    Status: Preview

    Skills you'll gain: Network Security, Network Planning And Design, VPN Clients, Virtual Private Networks (VPN), Cyber Security Strategy, Network Architecture, Firewall, Security Controls, Network Monitoring, Intrusion Detection and Prevention, Virtual Local Area Network (VLAN), Threat Management, Threat Detection, Continuous Monitoring, Authentications, Wireless Networks, Authorization (Computing), Identity and Access Management, Encryption, Incident Response

  • Status: New
    Status: Free Trial

    Skills you'll gain: API Gateway, Authentications, Application Programming Interface (API), OAuth, API Design, Cloud API, Open Web Application Security Project (OWASP), Authorization (Computing), Restful API, Threat Modeling, Application Security, Data Security, Distributed Denial-Of-Service (DDoS) Attacks, Identity and Access Management, Encryption, Security Controls, Prometheus (Software), Flask (Web Framework), Grafana, Python Programming

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Network Security, Threat Modeling, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Cloud Computing, Encryption, Malware Protection, Intrusion Detection and Prevention, Identity and Access Management, Cyber Attacks, Data Integrity

  • Status: New
    Status: Free Trial

    Skills you'll gain: Responsible AI, Incident Response, Application Security, Security Engineering, Threat Modeling, Cybersecurity, MLOps (Machine Learning Operations), Security Controls, Information Systems Security, Artificial Intelligence and Machine Learning (AI/ML), Security Strategy, Continuous Monitoring, Identity and Access Management, Cloud Security, Vulnerability Assessments, Hardening, Threat Detection, Artificial Intelligence, Penetration Testing, Machine Learning

  • Status: Free Trial

    Skills you'll gain: Identity and Access Management, Endpoint Security, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cyber Security Strategy, Secure Coding, Firewall, Application Security, Authentications, Infrastructure Security, Security Controls, Authorization (Computing), Security Information and Event Management (SIEM), Data Governance, Security Testing, Virtual Private Networks (VPN)

  • Status: Free Trial

    Skills you'll gain: Risk Management Framework, Cyber Risk, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cybersecurity, Security Management, Cyber Governance, Cyber Security Strategy, Risk Management, Security Controls, Infrastructure Security, Cyber Security Assessment, Vulnerability Assessments, Authorization (Computing), Security Requirements Analysis, Continuous Monitoring, Cyber Security Policies, Information Assurance, Information Systems Security