![Ansible for Network Automation](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/ce/b7815b9d6942a681fe9d133f4b1f17/800x800-1-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Ansible for Network Automation
Available now
![Data Security](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/7e/b24d776114486b993a37e1b1c4abfa/800x800-1-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Data Security
Available now
![DevOps for Network Automation (NetDevOps)](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/33/0bfbb3fcd84f18a12afcee0f21475b/800x800-1-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
DevOps for Network Automation (NetDevOps)
Available now
![Endpoints and Systems](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/d3/85f3782d8f4b60ad6b532a75feaf22/800x800-1-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Endpoints and Systems
Available now
![Introducing Model-Driven Programmability](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/34/de74783c274265968a3c4ec07d407c/800x800-1-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Introducing Model-Driven Programmability
Available now
![Introduction to Network Automation](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/2a/94f5da94854aa0829d855da8d065af/800x800-1-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Introduction to Network Automation
Available now
![Network Security](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/d4/307fcbf7e94998a2f74f837a3e6943/800x800-1-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Network Security
Available now
![Security Operations Center (SOC)](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/3e/588498e6d64a21ab734f59e2d256b7/800x800-1-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Security Operations Center (SOC)
Available now
![Threat Analysis](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/4f/a1acad604f4eb9a06c057dea55f937/800x800-1-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Threat Analysis
Available now
![Threat Investigation](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/fe/f93f2fed0842af88342363abd89875/800x800-1-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Threat Investigation
Available now
![Threat Response](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/97/6fd70b29ad4c54bf3d0a887f0cff10/800x800-1-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Threat Response
Available now
![Using APIs for Network Automation](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/59/d8ff7b59d64e6e969371d36287ab1e/800x800-1-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Using APIs for Network Automation
Available now