Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Find the Best Cybersecurity Course for Your Goals
- Status: Preview
University of Leeds
Skills you'll gain: Cryptographic Protocols, Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Data Security
- Status: Free Trial
University of California San Diego
Skills you'll gain: Data Ethics, Big Data, Cybersecurity, Pedagogy, Data Security, Cryptography, Information Privacy, Encryption, Responsible AI, AI Personalization, Computer Science, Information Technology, Informatics, Web Servers, Machine Learning, Supervised Learning, Artificial Neural Networks
- Status: Free Trial
Skills you'll gain: Incident Management, Incident Response, Security Management, Computer Security Incident Management, Continuous Monitoring, Infrastructure Security, Cybersecurity, Cyber Security Policies, Telecommuting, Threat Modeling, Cyber Security Strategy, Security Controls, Security Strategy, Problem Management, Security Awareness, Employee Engagement
- Status: Free Trial
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Linux, Linux Administration, Network Security, Role-Based Access Control (RBAC), Linux Commands, User Accounts, Network Monitoring, System Monitoring, Network Administration, Hardening, Information Systems Security, Security Controls, Wireless Networks, Firewall, Penetration Testing, Cybersecurity, Containerization, File Management
Skills you'll gain: Exploit development, Test Tools, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Assessments, Web Development Tools, Application Security, Web Servers, Network Protocols, Web Applications, Proxy Servers, Automation
- Status: Preview
Skills you'll gain: Cloud Security, Internet Of Things, Network Security, Application Security, Security Engineering, Information Systems Security, Data Security, Cloud Services, Infrastructure Security, Security Controls, Cloud Computing, Application Design, Time Series Analysis and Forecasting, Encryption, Cryptography, Data Analysis, Identity and Access Management, Data Integrity, Authentications, Predictive Analytics
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Governance, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Security Management, Data Sharing, Data Encryption Standard, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Data Ethics, Computer Security Awareness Training, Ethical Standards And Conduct, Cybersecurity, Information Technology, Responsible AI, Information Privacy, Media and Communications, Personally Identifiable Information, Artificial Intelligence, Law, Regulation, and Compliance, Data Collection
- Status: Free Trial
Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Secure Coding, Application Security, Identity and Access Management, Information Systems Security Assessment Framework (ISSAF), Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Security Strategy, Zero Trust Network Access, Security Awareness, Security Information and Event Management (SIEM), Risk Management Framework, Disaster Recovery, Security Controls, Cybersecurity, Enterprise Architecture
- Status: Free Trial
Coursera Instructor Network
Skills you'll gain: Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Attacks, Threat Modeling, Cyber Security Assessment, Risk Analysis, Vulnerability Assessments, Network Security, Security Strategy, Risk Mitigation
- Status: Free
Google Cloud
Skills you'll gain: Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Intelligence, Cloud Security, Computer Security Incident Management, Google Cloud Platform, Network Security, System Monitoring, Cloud Computing
- Status: New
Skills you'll gain: Computer Hardware, Operating Systems, Databases, Hardware Troubleshooting, Information Technology, Technical Support, System Configuration, Security Controls, Wireless Networks, Software Installation, Computer Networking, Computer Security Awareness Training, Peripheral Devices
In summary, here are 10 of our most popular cybersecurity courses
- An Introduction to Cryptography:Â University of Leeds
- Teaching Impacts of Technology: Data Collection, Use, and Privacy:Â University of California San Diego
- Incident Management and Continuous Improvement:Â LearnQuest
- Linux for Security Experts:Â Codio
- Burp Suite Unfiltered - Go from a Beginner to Advanced:Â Packt
- Developing Secure IoT Applications:Â EDUCBA
- Cyber Security: Data Security and Information Privacy:Â Macquarie University
- Computing, Ethics, and Society Foundations:Â University of Colorado Boulder
- Designing Information System Security Architectures:Â LearnQuest
- Introduction to Prompt Injection Vulnerabilities:Â Coursera Instructor Network