Unnamed: 0
int64 0
628
| Title
stringlengths 5
92
| Organization
stringlengths 3
63
| Skills
stringlengths 4
998
| Ratings
float64 2.8
5
| course_url
stringlengths 37
128
⌀ | course_students_enrolled
stringlengths 5
9
⌀ | course_description
stringlengths 25
4.02k
⌀ | Review Count
stringlengths 1
4
| Difficulty
stringclasses 4
values | Type
stringclasses 5
values | Duration
stringclasses 4
values |
---|---|---|---|---|---|---|---|---|---|---|---|
606 | Cyber Incident Response | Infosec | Computer Security Incident Management, Leadership and Management | 4.7 | null | null | null | 192 | Beginner | Specialization | 3 - 6 Months |
607 | Gestión de proyectos con la metodología Agile | Google | Leadership and Management, Project Management, Scrum (Software Development), Agile Software Development, Collaboration, Communication, Product Management, Strategy and Operations, Organizational Development, Product Development, Software Engineering | 4.8 | null | null | null | 495 | Beginner | Course | 1 - 4 Weeks |
608 | Teach English Now! Technology Enriched Teaching | Arizona State University | Planning | 4.9 | null | null | null | 1.5K | Beginner | Course | 1 - 3 Months |
609 | Faster Together, Enhancing the Recruitment of Marginalized Communities in Clinical Trials | Vanderbilt University | Recruitment, Communication | 4.8 | null | null | null | 97 | Beginner | Course | 1 - 3 Months |
610 | Web3 and Blockchain Leadership for Transformation | INSEAD | Leadership and Management, BlockChain, FinTech, Finance, Strategy, Strategy and Operations, Business Transformation, Innovation, Cryptography, Risk Management | 4.6 | null | null | null | 11 | Beginner | Course | 1 - 3 Months |
611 | Cybersecurity for Everyone | University of Maryland, College Park | Cyberattacks, Human Computer Interaction, Network Security, Security Engineering, Security Strategy, Computer Security Models, Leadership and Management, Risk Management, Software Security, Critical Thinking | 4.7 | https://www.coursera.org/learn/cybersecurity-for-everyone | 4,727 | The Cybersecurity Operations Fundamentals Specialization gives you the basic skills you need to begin a career as an entry-level cybersecurity analyst. As you progress through this Specialization, you'll gain the foundational knowledge that organizations require to protect their network.
Completing this Specialization will prepare you to start your career as a Security Operations Center Analyst.
Previous IP networking knowledge is preferred.
Applied Learning Project
There will not be any projects for this specialization.
The Cybersecurity Operations Fundamentals Specialization gives you the basic skills you need to begin a career as an entry-level cybersecurity analyst. As you progress through this Specialization, you'll gain the foundational knowledge that organizations require to protect their network.
| 1.3K | Beginner | Course | 1 - 3 Months |
612 | International Security Management | Erasmus University Rotterdam | Leadership and Management, Risk Management | 4.7 | null | null | null | 1K | Beginner | Course | 1 - 3 Months |
613 | Python for Cybersecurity | Infosec | Python Programming, Computer Programming | 4.5 | https://www.coursera.org/specializations/pythonforcybersecurity | 12,936 | Python is one of the most popular and widely-used programming languages in the world due to its high usability and large collection of libraries. This learning path provides an application-driven introduction to using Python for cybersecurity. Python can help to automate tasks across the cyberattack life cycle for both cyber attackers and defenders. This Specialization demonstrates some of these applications and how Python can be used to make cybersecurity professionals more efficient and effective.
Applied Learning Project
Learners will acquire the technical skills needs to develop custom Python scripts to automate cybersecurity tasks. The challenges in this project involve developing or modifying Python code to address cybersecurity use cases drawn from MITRE ATT&CK and Shield.
| 349 | Intermediate | Specialization | 3 - 6 Months |
614 | Network Security | Cisco Learning and Certifications | Network Security | 4.7 | null | null | null | 59 | Mixed | Course | 1 - 4 Weeks |
615 | Security & Safety Challenges in a Globalized World | Universiteit Leiden | Risk Management | 4.8 | null | null | null | 404 | Beginner | Course | 1 - 3 Months |
616 | JavaScript Security | Infosec | Javascript, Security Engineering, Web Development, Java Programming | 4.5 | null | null | null | 66 | Intermediate | Specialization | 1 - 3 Months |
617 | Cryptography I | Stanford University | Algorithms, Cryptography, Mathematics, Security Engineering, Theoretical Computer Science, Probability & Statistics, Critical Thinking, Mathematical Theory & Analysis, Computer Security Models, Probability Distribution | 4.8 | https://www.coursera.org/learn/crypto | 118,242 | This Specialization covers elements of three major creative writing genres: short story, narrative essay, and memoir. You will master the techniques that good writers use to compose a bracing story, populated with memorable characters in an interesting setting, written in a fresh descriptive style. You will analyze and constructively evaluate peer writing. In the Capstone, you will draft, rewrite, and complete a substantial original story in the genre of your choosing.
Our courses are designed for anyone from the aspiring short story writer to established novelist. Whether you have a finished novel sitting on your desk calling for a fresh look or have had the germ of an idea for a decade, this Specialization gives you tools to achieve your goal. Through 4 courses focused on a key aspect of writing, and taken in any order you choose, you will develop a stronger ability to not only refine your writing, but critique writing in general and find inspiration in the works you are already reading.
Thanks to our sponsors, upon completion of their first assignment, learners in each course will receive up to an 80% discount from Write-Bros and a 30% discount off their first purchase from Scrivener to use on their writing software. Additionally, learners who complete an assignment will receive 30% off membership at the online writing community Scribophile. For more information about our partners, see the FAQ below.
| 4.2K | Mixed | Course | 1 - 3 Months |
618 | Security Operations Center (SOC) | Cisco Learning and Certifications | Operations Management | 4.8 | null | null | null | 72 | Mixed | Course | 1 - 3 Months |
619 | Security Awareness Training | ISC2 | Human Factors (Security), Security Engineering, Security Strategy, Software Security, System Security, Network Security, Security Software, Cyberattacks, Human Computer Interaction, Mobile Security | 4.7 | null | null | null | 1.2K | Beginner | Course | 1 - 3 Months |
620 | Security Governance & Compliance | University of California, Irvine | Leadership and Management, Risk Management | 4.6 | null | null | null | 124 | Mixed | Course | 1 - 4 Weeks |
621 | Cybersecurity and Mobility | University System of Georgia | Mobile Security, Security Engineering, Strategy, Mobile Development, Software Security, System Security, Business Intelligence, Human Computer Interaction, Leadership and Management, Security Strategy, Internet Of Things | 4.5 | null | null | null | 611 | Beginner | Course | 1 - 4 Weeks |
622 | Security Operations | ISC2 | Computer Security Incident Management, Risk Management, Cryptography | 4.5 | null | null | null | 47 | Beginner | Course | 1 - 3 Months |
623 | Security Principles | ISC2 | Leadership and Management | 4.7 | https://www.coursera.org/learn/-security-principles | 10,313 | Welcome to course 1 of 5 of this Specialization, Security Principles.
After completing this course, the participant will be able to:
Discuss the foundational concepts of cybersecurity principles.
- Recognize foundational security concepts of information assurance.
- Define risk management terminology and summarize the process.
- Relate risk management to personal or professional practices.
- Classify types of security controls.
- Distinguish between policies, procedures, standards, regulations and laws.
- Demonstrate the relationship among governance elements.
- Analyze appropriate outcomes according to the canons of the (ISC)2 Code of Ethics when given examples.
- Practice the terminology and review security principles.
Agenda
Course Introduction
Module 1: Information Assurance
Module 2: Risk Management Process
Module 3: Security Controls
Module 4: Governance
Module 5: (ISC)2 Code of Ethics
Module 6: Course Summary
This training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam.
There are no prerequisites to take the training or the exam. It is recommended that candidates have basic Information Technology (IT) knowledge. No work experience in cybersecurity or formal education diploma/degree is required.
| 245 | Beginner | Course | 1 - 3 Months |
624 | Google Workspace Security | Google Cloud | Security Engineering, Security Strategy, Software Security, System Security, Account Management, Cloud Platforms, Network Security, Security Software, Cloud Infrastructure, Strategy | 4.7 | null | null | null | 762 | Beginner | Course | 1 - 4 Weeks |
625 | Cybersecurity for Tech Professionals | Campus BBVA | Computer Security Incident Management, System Security, Computer Security Models, System Software, Cyberattacks, Software Security, Mobile Security, Network Security, Critical Thinking, Security Engineering, E-Commerce | 4.7 | null | null | null | 106 | Intermediate | Course | 1 - 3 Months |
626 | Cybersecurity in the Cloud | University of Minnesota | Security Engineering, System Security, Network Security, Software Security, Cloud Computing, Computer Networking, Cryptography, Computer Security Models, Databases, Network Architecture, Data Management, Account Management | 4.3 | null | null | null | 127 | Beginner | Specialization | 3 - 6 Months |
627 | Applied Cryptography | University of Colorado System | Cryptography, Security Engineering, Algorithms, Mathematics, Theoretical Computer Science, Critical Thinking, Mathematical Theory & Analysis, System Security, Computer Security Models, Cyberattacks, Probability Distribution, Software Security, Applied Mathematics, Computational Logic, BlockChain, Computational Thinking | 4.5 | null | null | null | 744 | Intermediate | Specialization | 3 - 6 Months |
628 | Python for Active Defense | Infosec | Computer Programming, Python Programming | 4.3 | null | null | null | 37 | Intermediate | Course | 1 - 4 Weeks |