• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Computer Security
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Learn a new tool or skill in an interactive, hands-on environment.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "computer security"

    • Status: New
      New
      Status: Free Trial
      Free Trial
      U

      University of Colorado Boulder

      Security and Ethical Hacking

      Skills you'll gain: Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Vulnerability Assessments, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms

      4.3
      Rating, 4.3 out of 5 stars
      ·
      9 reviews

      Intermediate · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      U

      University of London

      Introduction to Computer Security

      Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, TCP/IP, Network Analysis

      4.8
      Rating, 4.8 out of 5 stars
      ·
      37 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      Status: AI skills
      AI skills
      G

      Google

      Google Cybersecurity

      Skills you'll gain: Threat Modeling, Network Security, Threat Management, Vulnerability Management, Intrusion Detection and Prevention, Hardening, Computer Security Incident Management, Security Management, Cyber Threat Intelligence, Cyber Attacks, Incident Response, Cybersecurity, Network Protocols, Threat Detection, Bash (Scripting Language), Debugging, Linux, Interviewing Skills, Python Programming, SQL

      Build toward a degree

      4.8
      Rating, 4.8 out of 5 stars
      ·
      57K reviews

      Beginner · Professional Certificate · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      U

      University of Colorado System

      Computer Communications

      Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Communication Systems, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Planning And Design, Network Architecture, General Networking, Computer Networking, Network Infrastructure, Network Performance Management, Wireless Networks, Telecommunications, Software-Defined Networking, Algorithms

      4.6
      Rating, 4.6 out of 5 stars
      ·
      3.3K reviews

      Intermediate · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      I

      IBM

      Computer Networks and Network Security

      Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Information Systems Security, Intrusion Detection and Prevention, Endpoint Security, Network Infrastructure, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention

      4.7
      Rating, 4.7 out of 5 stars
      ·
      3.4K reviews

      Intermediate · Course · 1 - 3 Months

    • Status: New
      New
      Status: Free Trial
      Free Trial
      P

      Pearson

      (SSCP) Systems Security Certified Practitioner

      Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Network Security, Authentications, Mobile Security, OSI Models, System Monitoring, Investigation, Security Controls, Security Strategy, Risk Analysis

      Beginner · Specialization · 1 - 3 Months

    What brings you to Coursera today?

    • Status: New
      New
      Status: Free Trial
      Free Trial
      E

      EC-Council

      Information Security Analyst

      Skills you'll gain: Network Security, Incident Response, Computer Security Incident Management, Cryptography, Penetration Testing, Vulnerability Management, Cybersecurity, Application Security, Security Information and Event Management (SIEM), Cyber Security Policies, Threat Detection, Network Monitoring, Cloud Security, Vulnerability Assessments, Malware Protection, Mobile Security, Identity and Access Management, Internet Of Things, Risk Analysis, Web Applications

      4.9
      Rating, 4.9 out of 5 stars
      ·
      20 reviews

      Beginner · Professional Certificate · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      I

      ISC2

      Certified in Cybersecurity

      Skills you'll gain: Network Security, Incident Response, Business Continuity, Disaster Recovery, Security Controls, Configuration Management, Governance, Cybersecurity, Security Management, Computer Security Incident Management, Cyber Attacks, Computer Security Awareness Training, Information Assurance, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)

      4.7
      Rating, 4.7 out of 5 stars
      ·
      1.1K reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      E

      EC-Council

      Cybersecurity Attack and Defense Fundamentals

      Skills you'll gain: Penetration Testing, Network Security, Threat Modeling, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Cloud Computing, Encryption, Malware Protection, Intrusion Detection and Prevention, Identity and Access Management, Cyber Attacks, Data Integrity

      4.6
      Rating, 4.6 out of 5 stars
      ·
      744 reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free
      Free
      I

      Infosec

      CompTIA Security+ 701

      Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Security Management, Network Security, Security Information and Event Management (SIEM), Security Controls, Identity and Access Management, Cryptography, Threat Detection, Data Security, Computer Security, Encryption, Personally Identifiable Information, Data Governance, Firewall, Vulnerability Assessments, User Accounts, Authorization (Computing), Risk Management

      4.5
      Rating, 4.5 out of 5 stars
      ·
      380 reviews

      Intermediate · Course · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      U

      University of London

      Cyber Security – Technology and Governance

      Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks

      4.7
      Rating, 4.7 out of 5 stars
      ·
      107 reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: New
      New
      Status: Preview
      Preview
      M

      Macquarie University

      Cyber Security: Essentials for Workplace

      Skills you'll gain: Human Factors (Security), Security Awareness, Cyber Security Strategy, Cyber Governance, Data Ethics, User Experience Design, Cyber Security Policies, Cyber Security Assessment, Cyber Attacks, Cyber Risk, Security Management, Cybersecurity, Security Strategy, Culture Transformation, Cyber Threat Intelligence, Cyber Threat Hunting, Data Security, Network Security, Cloud Security, Mobile Security

      Beginner · Course · 1 - 3 Months

    Searches related to computer security

    computer security and systems management
    proactive computer security
    introduction to computer security
    computer networks and network security
    fundamentals of computer network security
    azure: compute, storage, and database security
    introduction to computers and operating systems and security
    1234…48

    In summary, here are 10 of our most popular computer security courses

    • Security and Ethical Hacking: University of Colorado Boulder
    • Introduction to Computer Security: University of London
    • Google Cybersecurity: Google
    • Computer Communications: University of Colorado System
    • Computer Networks and Network Security: IBM
    • (SSCP) Systems Security Certified Practitioner: Pearson
    • Information Security Analyst: EC-Council
    • Certified in Cybersecurity: ISC2
    • Cybersecurity Attack and Defense Fundamentals: EC-Council
    • CompTIA Security+ 701: Infosec

    Frequently Asked Questions about Computer Security

    Coursera’s computer security courses teach critical skills needed to protect information and systems:

    • Fundamental principles of cybersecurity, including how to identify vulnerabilities
    • Techniques for securing networks, systems, and data from cyber threats
    • Best practices for implementing encryption and securing digital communications
    • Understanding of compliance and legal issues related to digital security
    • Incident response and how to manage breaches effectively
    • Use of cutting-edge tools for threat detection and cybersecurity forensics ‎

    No prior experience is required to get started with entry-level computer security courses on Coursera:

    • Beginners can start with introductory courses that provide a broad overview of cybersecurity concepts.
    • Those with some knowledge can choose courses that address more specific areas such as network security or ethical hacking.
    • Advanced courses are available for professionals seeking to specialize in areas like cybersecurity management or advanced forensics.‎

    Coursera offers various credentials to enhance your professional profile in computer security:

    • Professional certificates that help you develop foundational and advanced cybersecurity skills.
    • Specialized course certificates that focus on niche areas within computer security.
    • Credentials offered in conjunction with leading cybersecurity organizations and universities.

    These credentials are intended to help professionals demonstrate their qualifications and readiness to address cybersecurity challenges.‎

    Skills gained from Coursera’s computer security courses can lead to several career opportunities:

    • Cybersecurity Analyst, assessing security measures and responding to incidents
    • Information Security Manager, overseeing and securing organizational data
    • Network Security Engineer, designing and implementing secure network solutions
    • Forensic Computer Analyst, investigating cybercrimes and analyzing breaches
    • Security Consultant, providing expert advice on protecting against cyber threats ‎
    This FAQ content has been made available for informational purposes only. Learners are advised to conduct additional research to ensure that courses and other credentials pursued meet their personal, professional, and financial goals.

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok