![Advanced Python - Reconnaissance](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/91/469920f1a348f98ea08af3172e519a/Coursera_Advanced_Python_Scripting_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Advanced Python - Reconnaissance
Available now
![AI Security](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/3c/a56e37266f4bf4a4fd5b5e0bad8e37/Coursera-AI-Security_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
AI Security
Available now
![Applied ChatGPT for Cybersecurity](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/76/3d2b564c5a425bbf6ad4d70dc518da/Infosec-Applied_ChatGPT_for_Cybersecurity1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Applied ChatGPT for Cybersecurity
Available now
![Blockchain Security](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/96/ac88d055e8423a8511f3005e81a116/Coursera_Blockchain_Security_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Blockchain Security
Available now
![C++ Interacting with the World and Error Handling](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/e4/71785ec6be4b3584a892355ea1d1c0/Coursera-Writing-Secure-Code-in-C2_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
C++ Interacting with the World and Error Handling
Available now
![C++ Lab Content](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/37/a3febff0854943b10f60fa5aaf1acf/Coursera-Writing-Secure-Code-in-C2_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
C++ Lab Content
Available now
![C++ Superpowers and More](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/60/b0437a2bc846578b4247d631050f18/Coursera-Writing-Secure-Code-in-C2_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
C++ Superpowers and More
Available now
![Certified Cloud Security Professional (CCSP)](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/a4/d3822c1b74485db1f371f11db1090f/Certified-Cloud-Security-Practitioner-CCSP-_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Certified Cloud Security Professional (CCSP)
Available now
![CompTIA Project+](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/01/8900562f4f4af0982978f92e969af3/Coursera-Project-Plus_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
CompTIA Project+
Available now
![CompTIA Security+ 701](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/a9/9989e2580c4cdaac65a0dca1541975/Coursera-CompTIA-Linux-1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
CompTIA Security+ 701
Available now
![Credential Access, discovery, lateral movement & collection](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/22/15266d46f340de854710bef4468d76/Coursera_Python_for_CS_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Credential Access, discovery, lateral movement & collection
Available now
![Cyber Incident Response](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/a0/716b9ad9f64316823eff5c906fdd30/Coursera_Incident_Response_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Cyber Incident Response
Available now
![Cyber Threat Hunting](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/9f/35c6a57b8447bc96aef2f5017f6674/Coursera_Cyber_Threat_Hunting_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Cyber Threat Hunting
Available now
![Cybersecurity Policy Foundations](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/f4/5235b4d0a641eb8cbd49853649af08/Coursera_Cybersecurity_Foundations_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Cybersecurity Policy Foundations
Available now
![Defensive Python](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/b2/5fad3d43a94ddca5450b10dede2738/Coursera_Advanced_Python_Scripting_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Defensive Python
Available now
![Digital Forensics Concepts](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/a1/05cf5bcbb448cab7b14035946c66d3/Coursera_Computer_Forensics_600x600.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Digital Forensics Concepts
Available now
![Establishing Command-and-Control and Finding Credentials](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/b1/86c0e650894a00b6616bc80d7d647d/Coursera_Advanced_Python_Scripting_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Establishing Command-and-Control and Finding Credentials
Available now
![Execution, persistence, privilege escalation and evasion](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/c4/600586f095429fa3b0dcbdd4a72772/Coursera_Python_for_CS_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Execution, persistence, privilege escalation and evasion
Available now
![Fundamental Privacy Acts and Laws](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/5d/52290684b141558a1115c4fee16836/Coursera_Privacy_Fundamentals_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Fundamental Privacy Acts and Laws
Available now
![Governance and Strategy](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/83/3a80321aef4dea974ba09a19e6c644/Coursera-Cybersecurity-Leadership-and-Management-600x600.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Governance and Strategy
Available now
![Introduction to C++](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/b6/5317e5fd7b4e068fe9a06a3b2d50c6/Coursera-Writing-Secure-Code-in-C2_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Introduction to C++
Available now
![Introduction to Cybersecurity Foundations](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/65/fd51188f0947bca11e033130a0a9b9/Coursera_Cybersecurity_Foundations_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Introduction to Cybersecurity Foundations
Available now
![Introduction to Privacy - Part 1](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/8a/a54c94f111460a996c32f88a719e92/Coursera_Privacy_Fundamentals_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Introduction to Privacy - Part 1
Available now
![Introduction to Privacy - Part 2](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/10/35278500ae4f8f9f1ee5f37063eb4e/Coursera_Privacy_Fundamentals_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Introduction to Privacy - Part 2
Available now
![Introduction to Privacy - Part 3](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/17/167ccf2c3a4751ad5edb291a80db6a/Coursera_Privacy_Fundamentals_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Introduction to Privacy - Part 3
Available now
![Introduction to Python for Cybersecurity](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/0b/f4e51af0f844cdab87611d50655dfd/Coursera_Python_for_CS_600x600.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Introduction to Python for Cybersecurity
Available now
![JavaScript Security Part 1](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/c6/71e9b684f54b289f6ad5438e60aaf2/Coursera_Javascript_Security_600x600.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
JavaScript Security Part 1
Available now
![JavaScript Security Part 2](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/45/a93492a2694bf5b1a7076eca107078/Coursera_Javascript_Security_600x600.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
JavaScript Security Part 2
Available now
![JavaScript Security Part 3](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/59/611153be874945be1503dd07c96b24/Coursera_Javascript_Security_600x600.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
JavaScript Security Part 3
Available now
![JavaScript Security Refreshers](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/16/97368d4787416ab6dcb90387a5ce3e/Coursera_Javascript_Security_600x600.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
JavaScript Security Refreshers
Available now
![Laravel Additional Security](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/38/5a0d9d4cd44bb28c57e9af17ea8a7e/Coursera_Secure_Coding_in_Laravel_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Laravel Additional Security
Available now
![Laravel Protections](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/94/698f4175c642a896d4411281df6302/Coursera_Secure_Coding_in_Laravel_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Laravel Protections
Available now
![Laravel: Configure, Validate, Authenticate and Authorize](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/07/7bcb1c9f004772881f159e52f88d28/Coursera_Secure_Coding_in_Laravel_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Laravel: Configure, Validate, Authenticate and Authorize
Available now
![Leadership](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/b5/5515a796d24953819ccab57e307766/clm_600x600.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Leadership
Available now
![Linux+ XK0-005](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/00/07876c96c240578faf3a2397c8594b/Coursera-CompTIA-Linux-1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Linux+ XK0-005
Available now
![Management](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/0a/7584c911bb47be983066b57d16a27c/clm_600x600.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Management
Available now
![NIST 800-171](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/96/607dd2d9c74575bf18f89eff8618f6/Coursera_Cybersecurity_Risk_Management_Framework_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
NIST 800-171
Available now
![NIST CSF](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/b3/dd3b82bfe543669a12dcb5e6f090e3/Coursera_Cybersecurity_Risk_Management_Framework_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
NIST CSF
Available now
![NIST DoD RMF](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/23/e262b1d9a94fb6aaa8be43d360c683/Coursera_Cybersecurity_Risk_Management_Framework_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
NIST DoD RMF
Available now
![Operating System Foundations](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/e5/564fe463a741f0a694938e8e305d76/Coursera_Cybersecurity_Foundations_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Operating System Foundations
Available now
![OWASP Top 10 - Risks 6-10](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/81/3959e80be043a7ae88d41ae2065cdb/Coursera-OWASP-Top-10_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
OWASP Top 10 - Risks 6-10
Available now
![OWASP Top 10 - Welcome and Risks 1-5](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/a4/b241d15b92473eb5b2bb1d537bbdde/Coursera-OWASP-Top-10_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
OWASP Top 10 - Welcome and Risks 1-5
Available now
![Previous OWASP Risks](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/c5/e69aba19e848109a89be2404bd8d57/Coursera-OWASP-Top-10_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Previous OWASP Risks
Available now
![Python for Active Defense](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/42/94e6fbdd4f442b841f195258a9b524/Coursera_Python_for_CS_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Python for Active Defense
Available now
![Python for Command-and-control, Exfiltration and Impact](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/53/59b377ba13469fb9efa16771d81d84/Coursera_Python_for_CS_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Python for Command-and-control, Exfiltration and Impact
Available now
![Stages of Incident Response](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/a0/716b9ad9f64316823eff5c906fdd30/Coursera_Incident_Response_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Stages of Incident Response
Available now
![Technical Deep Dive with Incident Response Tools](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/a0/716b9ad9f64316823eff5c906fdd30/Coursera_Incident_Response_1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Technical Deep Dive with Incident Response Tools
Available now
![Windows OS Forensics](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/64/f2a38e5714414ea1b6ccc1ad141cd4/Coursera_Computer_Forensics_600x600.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Windows OS Forensics
Available now
![Windows Registry Forensics](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/65/d919f7e5db441c8edd569943c9cea4/Coursera_Computer_Forensics_600x600.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Windows Registry Forensics
Available now