Security Management

Security Management is a field that focuses on the protection of assets and information in business and other organizations. Coursera's Security Management catalogue provides extensive insights into risk assessment, security policies, incident response, and disaster recovery. You'll learn about the principles of information security, network security, and cybersecurity. You'll gain the skills to effectively manage security within an organization, understand various security models, implement security strategies, and respond to security incidents. This will equip you to safeguard vital information and technology assets while navigating the complex, evolving landscape of digital threats and regulations.
49credentials
1online degree
173courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "security management"

  • Status: Free Trial

    Skills you'll gain: Cloud Security, Cyber Security Policies, Security Management, Data Management, Records Management, Cloud Computing Architecture, General Data Protection Regulation (GDPR), Cloud Computing, Data Governance, Personally Identifiable Information, Information Privacy, Threat Detection, Microsoft Azure, Security Controls, Threat Management

  • Status: Free Trial

    Skills you'll gain: Event Monitoring, General Networking, Network Architecture, Systems Integration, Incident Response, TCP/IP, Enterprise Architecture, Cybersecurity, Security Management, Networking Hardware, Computer Networking, Cloud-Based Integration, Network Security, Threat Detection, Cyber Security Policies, Security Information and Event Management (SIEM), Data Governance, Data Management, Command-Line Interface, Security Strategy

  • Status: Free Trial

    Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Endpoint Security, Microsoft Windows, Mobile Security, Operating System Administration, Security Management, Android (Operating System), Patch Management, Microsoft Azure, System Configuration, System Monitoring, Azure Active Directory, Windows Servers, Remote Access Systems

  • Status: New
    Status: Free Trial

    Skills you'll gain: Security Management, Security Strategy, Configuration Management, Security Controls, Information Systems Security, Computer Security Awareness Training, Enterprise Security, Change Control, Safety and Security, Cyber Security Policies, Data Ethics

  • Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Configuration Management, Data Ethics, Data Integrity, Identity and Access Management

  • Status: Free Trial

    Skills you'll gain: Risk Analysis, Risk Management, Incident Response, Business Continuity Planning, Security Management, Threat Modeling, Threat Management, Disaster Recovery, Vulnerability Assessments, Cyber Risk, Cyber Threat Intelligence, Continuous Monitoring, Cybersecurity, Vulnerability Management, Security Strategy, General Data Protection Regulation (GDPR)

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Cyber Governance, Security Management, NIST 800-53, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Legal Risk

  • Status: Free Trial

    Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Risk Management, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cyber Threat Intelligence, Governance Risk Management and Compliance, Continuous Monitoring, Cyber Security Strategy, Security Information and Event Management (SIEM), Threat Detection, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Key Performance Indicators (KPIs)

  • Status: Free Trial

    University of California, Irvine

    Skills you'll gain: Vendor Management, Security Management, Supplier Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Human Factors (Security), Asset Protection, Due Diligence, Training Programs

  • Status: Free Trial

    Kennesaw State University

    Skills you'll gain: Network Security, Network Administration, Security Management, Firewall, Network Monitoring, Cybersecurity, General Networking, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, System Monitoring, Security Awareness, TCP/IP, Intrusion Detection and Prevention, Cloud Computing, Threat Detection

  • Status: Free Trial

    Skills you'll gain: IT Service Management, Information Technology Infrastructure Library, Change Control, IT Management, Information Technology Architecture, Service Management, Security Management, Enterprise Architecture, Risk Management Framework, IT Infrastructure, IT Security Architecture, Capacity Management, Problem Management, Release Management, Incident Management

  • Status: Free Trial

    Skills you'll gain: Continuous Monitoring, Medical Privacy, Risk Management, Health Information Management, Health Care Procedure and Regulation, Risk Mitigation, Information Privacy, Security Management, Risk Analysis, Patient Safety, Personally Identifiable Information, Information Systems Security, Security Controls, Data Security, Regulatory Compliance, Threat Modeling, Vulnerability Assessments