Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Information Security Course Catalog
- Status: Free Trial
Skills you'll gain: User Story, Business Requirements, Requirements Analysis, Requirements Elicitation, Business Analysis, User Requirements Documents, Gap Analysis, Project Documentation, Systems Analysis, Functional Specification, Business Process Modeling, Process Flow Diagrams, Needs Assessment, Data Visualization
- Status: Free Trial
Splunk Inc.
Skills you'll gain: Splunk, Data Visualization Software, Dashboard, Ad Hoc Reporting, Business Intelligence, Data Analysis, Email Automation, Data Processing, Big Data, Data Science, Event Monitoring, Query Languages, Analysis, Incident Response, Business Analysis
Google Cloud
Skills you'll gain: Generative AI, Generative Model Architectures, Google Cloud Platform, Image Analysis, Unsupervised Learning
- Status: Free Trial
Skills you'll gain: Business Analysis, Business Process, Business Modeling, Business Process Improvement, Business Risk Management, Business Requirements, Business Strategies, Systems Analysis, Analysis, Organizational Strategy, Case Studies, Risk Management, Requirements Management, Stakeholder Engagement
- Status: Free Trial
University of Illinois Urbana-Champaign
Skills you'll gain: Big Data, Apache Spark, Data Storage Technologies, Apache Hadoop, Distributed Computing, Data Storage, Data Processing, NoSQL, Apache Kafka, Real Time Data, Cloud Computing, Databases, Analytics, Deep Learning, Scalability, Machine Learning Algorithms, Graph Theory, Machine Learning, Live Streaming
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Fraud detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Security Strategy, Threat Modeling, Email Security, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Cyber Governance, Data Security, Wireless Networks, Emerging Technologies, Business Technologies, Enterprise Application Management
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Arithmetic, Algorithms, Applied Mathematics, Probability, Computer Science
- Status: Free Trial
The Hong Kong University of Science and Technology
Skills you'll gain: Requirements Analysis, Unified Modeling Language, Object Oriented Design, Functional Requirement, Data Modeling, Object Oriented Programming (OOP), Systems Development Life Cycle, System Requirements, Software Development, Software Engineering, Software Systems, Project Planning, Project Management
- Status: Free Trial
Akamai Technologies, Inc.
Skills you'll gain: Linux, Ubuntu, Linux Administration, File Systems, Linux Commands, Operating Systems, User Accounts, Red Hat Enterprise Linux, OS Process Management, File Management, Unix Shell, Unix Commands, System Configuration, Command-Line Interface, Open Source Technology, Role-Based Access Control (RBAC), Virtualization, Virtual Machines, Software Installation
- Status: Free Trial
Google Cloud
Skills you'll gain: Google Gemini, Responsible AI, Google Workspace, Generative AI, Productivity Software, Workflow Management, Gmail, Operational Efficiency, Google Docs, Business Process Automation
- Status: Preview
Campus BBVA
Skills you'll gain: Incident Response, Security Management, Cybersecurity, Cyber Attacks, Cyber Risk, Security Awareness, Data Security, Email Security, Mobile Security, Business Process, Authentications, Fraud detection, Identity and Access Management, Multi-Factor Authentication, Encryption
Information Security learners also search
In summary, here are 10 of our most popular information security courses
- Requirements Gathering in Business Analysis:Â Microsoft
- Splunk Search Expert 101:Â Splunk Inc.
- Introduction to Image Generation:Â Google Cloud
- Business Analysis: Key Definitions & Strategy Analysis:Â Starweaver
- Cloud Computing Applications, Part 2: Big Data and Applications in the Cloud:Â University of Illinois Urbana-Champaign
- AI for Cybersecurity:Â Johns Hopkins University
- Cybersecurity and Mobility:Â Kennesaw State University
- Mathematical Foundations for Cryptography:Â University of Colorado System
- Software Engineering: Modeling Software Systems using UML:Â The Hong Kong University of Science and Technology
- Operating Systems Fundamentals:Â Akamai Technologies, Inc.