• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Security Mitigation

Results for "security+mitigation"


  • U

    University of Colorado System

    Computer Security and Systems Management

    Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Microsoft Servers, Operating System Administration, Systems Administration, Virtualization, Cybersecurity

    4.6
    Rating, 4.6 out of 5 stars
    ·
    1.9K reviews

    Beginner · Specialization · 3 - 6 Months

  • C

    Coursera

    Harden Workspace Security

    Skills you'll gain: Hardening, Incident Response, Single Sign-On (SSO), Threat Management, Security Management, Security Controls, Continuous Monitoring, User Provisioning, Threat Detection, Security Information and Event Management (SIEM), Identity and Access Management, Enterprise Application Management, IT Automation

    Beginner · Course · 1 - 4 Weeks

  • E

    Edureka

    Cyber Threat Intelligence and Incident Response

    Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Cyber Attacks, Security Information and Event Management (SIEM), Event Monitoring, Cyber Engineering, Patch Management, Network Security, Malware Protection, Continuous Monitoring, Security Management, Cyber Risk, Digital Forensics, Risk Analysis

    Intermediate · Specialization · 1 - 3 Months

  • E

    Edureka

    Generative AI for Cybersecurity Professionals

    Skills you'll gain: AI Security, Responsible AI, Generative AI, Prompt Engineering, Data Ethics, Cyber Threat Intelligence, Cyber Security Strategy, Cybersecurity, LLM Application, Large Language Modeling, Compliance Training, Governance, Cyber Threat Hunting, Cyber Security Policies, Cyber Attacks, Cyber Risk, Artificial Intelligence and Machine Learning (AI/ML), Security Awareness, Machine Learning, Automation

    Intermediate · Course · 1 - 4 Weeks

  • G

    Google

    Play It Safe: Manage Security Risks

    Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Auditing, Compliance Auditing

    4.8
    Rating, 4.8 out of 5 stars
    ·
    11K reviews

    Beginner · Course · 1 - 4 Weeks

  • P

    Packt

    Cybersecurity Foundations & Threat Mitigation

    Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Zero Trust Network Access, Cyber Attacks, Application Security, Cyber Risk, Computer Security, Information Systems Security, Data Security, Network Security, Encryption, Multi-Factor Authentication, Cryptography, Authorization (Computing), Identity and Access Management

    4.9
    Rating, 4.9 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 4 Weeks

  • M

    Macquarie University

    Cyber Security: DevOps

    Skills you'll gain: DevSecOps, Cryptography, Network Security, Secure Coding, Application Security, Encryption, IT Security Architecture, Security Testing, Data Ethics, Advanced Encryption Standard (AES), Network Protocols, Cyber Threat Intelligence, Cybersecurity, CI/CD, Cloud Security, Software Development, Security Controls, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Software Architecture

    4.6
    Rating, 4.6 out of 5 stars
    ·
    20 reviews

    Beginner · Specialization · 3 - 6 Months

  • G

    Google

    Assets, Threats, and Vulnerabilities

    Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption, Cryptography

    4.8
    Rating, 4.8 out of 5 stars
    ·
    4.1K reviews

    Beginner · Course · 1 - 4 Weeks

  • I

    Illinois Tech

    Security: A Comprehensive Approach

    Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Cloud Deployment, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, System Configuration, Firewall, Cloud Computing Architecture, Linux Administration, Risk Management

    Build toward a degree

    4.7
    Rating, 4.7 out of 5 stars
    ·
    33 reviews

    Intermediate · Specialization · 3 - 6 Months

  • M

    Microsoft

    Cybersecurity Threat Vectors and Mitigation

    Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Security Strategy, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication

    4.8
    Rating, 4.8 out of 5 stars
    ·
    316 reviews

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    Security-Driven Software Development

    Skills you'll gain: Threat Modeling, Application Security, Open Web Application Security Project (OWASP), Secure Coding, Authentications, OAuth, Development Testing, Software Development Life Cycle, Unified Modeling Language, Authorization (Computing), Single Sign-On (SSO), Software Development, Security Software, Vulnerability Assessments, Data Validation, Cyber Security Assessment, Cyber Security Strategy, Cybersecurity, Role-Based Access Control (RBAC)

    Intermediate · Course · 3 - 6 Months

  • G

    Google Cloud

    Mitigating Security Vulnerabilities on GC - Português

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Loss Prevention, Google Cloud Platform, Application Security, Threat Management, Vulnerability Management, Personally Identifiable Information, Data Security, Infrastructure Security, Threat Detection, Continuous Monitoring, System Monitoring, Identity and Access Management, Real Time Data

    Intermediate · Course · 1 - 3 Months

1234…9

In summary, here are 10 of our most popular security+mitigation courses

  • Computer Security and Systems Management: University of Colorado System
  • Harden Workspace Security: Coursera
  • Cyber Threat Intelligence and Incident Response: Edureka
  • Generative AI for Cybersecurity Professionals: Edureka
  • Play It Safe: Manage Security Risks: Google
  • Cybersecurity Foundations & Threat Mitigation: Packt
  • Cyber Security: DevOps: Macquarie University
  • Assets, Threats, and Vulnerabilities: Google
  • Security: A Comprehensive Approach: Illinois Tech
  • Cybersecurity Threat Vectors and Mitigation: Microsoft

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok