University of Colorado System
Cybersecurity for Business Specialization
University of Colorado System

Cybersecurity for Business Specialization

Discover the practical side of computer security. Identify what threatens your business and master how to practically defend against those threats.

Greg Williams

Instructor: Greg Williams

Sponsored by Pontificia Universidad Católica del Perú

27,466 already enrolled

Get in-depth knowledge of a subject
4.7

(1,075 reviews)

Beginner level
No prior experience required
1 month
at 10 hours a week
Flexible schedule
Learn at your own pace
Get in-depth knowledge of a subject
4.7

(1,075 reviews)

Beginner level
No prior experience required
1 month
at 10 hours a week
Flexible schedule
Learn at your own pace

See how employees at top companies are mastering in-demand skills

Placeholder

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from University of Colorado System
Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

Specialization - 4 course series

Introduction to Cybersecurity for Business

Course 111 hours4.7 (1,046 ratings)

What you'll learn

Skills you'll gain

Category: Cybersecurity
Category: Data Security
Category: Information Systems Security
Category: Computer Security
Category: Computer Security Awareness Training
Category: Cryptography
Category: Encryption
Category: Enterprise Security
Category: Business Risk Management
Category: Data Integrity
Category: Data Governance
Category: Network Security
Category: Project Risk Management
Category: Project Management
Category: Risk Management
Category: Enterprise Risk Management (ERM)
Category: Risk Analysis
Category: Security Engineering
Category: Governance Risk Management and Compliance
Category: Cyber Risk

Cyber Threats and Attack Vectors

Course 211 hours4.7 (659 ratings)

What you'll learn

Skills you'll gain

Category: Cybersecurity
Category: Cyber Attacks
Category: Cloud Computing
Category: Vulnerability
Category: Network Security
Category: Human Factors (Security)
Category: Infrastructure Security
Category: Threat Modeling
Category: Data Security
Category: IT Security Architecture
Category: Security Engineering
Category: Information Technology
Category: Computer Security
Category: Security Management
Category: Information Systems Security
Category: Security Strategy
Category: Cloud Security
Category: Information Technology Architecture
Category: Enterprise Security
Category: Security Awareness

Detecting and Mitigating Cyber Threats and Attacks

Course 311 hours4.7 (454 ratings)

What you'll learn

Skills you'll gain

Category: Cybersecurity
Category: Network Security
Category: Computer Security Incident Management
Category: Intrusion Detection and Prevention
Category: Threat Detection
Category: Data Security
Category: Incident Management
Category: Information Systems Security
Category: Firewall
Category: Incident Response
Category: Threat Management
Category: Computer Security
Category: IT Security Architecture
Category: Enterprise Security
Category: Information Technology
Category: Cyber Security Strategy
Category: Information Technology Architecture
Category: Security Engineering

Proactive Computer Security

Course 411 hours4.6 (255 ratings)

What you'll learn

Skills you'll gain

Category: Cybersecurity
Category: Penetration Testing
Category: Information Systems Security
Category: Security Testing
Category: Application Security
Category: Vulnerability Assessments
Category: Cyber Threat Intelligence
Category: Vulnerability Management
Category: Computer Security
Category: Cyber Security Assessment
Category: Cyber Threat Hunting
Category: Data Security
Category: Threat Detection
Category: Vulnerability Scanning
Category: Security Engineering
Category: Security Software
Category: Open Web Application Security Project (OWASP)
Category: IT Security Architecture
Category: Network Security
Category: Threat Management

Instructor

Greg Williams
University of Colorado System
18 Courses156,298 learners

Offered by

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Placeholder

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy