Filter by
The language used throughout the course, in both instruction and assessments.
Results for "email+phishing"
Kennesaw State University
Skills you'll gain: Computer Security Models, Cyberattacks, Network Security, Security Engineering, Software Security, System Security, Computer Security Incident Management, Security Strategy, Security Software, Strategy
University of Colorado System
Skills you'll gain: Network Security, Security Engineering, Security Software, Software Security, System Security, Computer Programming, Computer Security Incident Management, Databases, SQL, Software Testing
Coursera Project Network
Skills you'll gain: Marketing
New York University
Skills you'll gain: Cyberattacks, Security Engineering
- Status: Free
Coursera Instructor Network
- Status: Free
Coursera Instructor Network
University of California, Davis
Skills you'll gain: Security Engineering, Computer Networking, Cryptography, Network Security
University of Colorado System
Skills you'll gain: Cyberattacks, Network Security, Security Engineering, Software Security, Computer Networking, Computer Security Incident Management, System Security, Cloud Computing, Computer Security Models, Operating Systems
University of London
Skills you'll gain: Computer Security Incident Management, Computer Security Models, Cryptography, Leadership and Management, Mobile Security, Risk Management, Security Engineering, System Security
New York University
Skills you'll gain: Computer Networking, Cyberattacks, Network Architecture, Network Security, Security Engineering, System Security, Security Strategy, Computer Security Models, Operational Analysis, Strategy
Royal Holloway, University of London
Coursera Project Network
In summary, here are 10 of our most popular email+phishing courses
- The Foundations of Cybersecurity:Â Kennesaw State University
- Hacking and Patching:Â University of Colorado System
- Create an Email Autoresponder Using Mailchimp:Â Coursera Project Network
- Introduction to Cyber Attacks:Â New York University
- Cybersecurity Best Practices:Â Coursera Instructor Network
- Introduction to Prompt Injection Vulnerabilities:Â Coursera Instructor Network
- Identifying Security Vulnerabilities:Â University of California, Davis
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Cyber Security Fundamentals:Â University of London
- Real-Time Cyber Threat Detection and Mitigation:Â New York University