Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Find the Best Cybersecurity Course for Your Goals
- Status: New
Skills you'll gain: Cybersecurity, Security Controls, Cyber Threat Intelligence, Cyber Attacks, Threat Management, Threat Detection, Vulnerability Assessments, Network Security, Application Security, Information Systems Security, Encryption, Data Security, Cloud Security, Vulnerability Management, Multi-Factor Authentication, Cryptography, Authorization (Computing), Identity and Access Management
University of Minnesota
Skills you'll gain: Enterprise Resource Planning, Business Systems Analysis, Systems Analysis, Requirements Analysis, Cybersecurity, Business Requirements, Business Systems, Cloud Computing, Cloud Services, IT Management, Change Management, Information Technology, Organizational Change, Technology Strategies, Process Flow Diagrams, System Implementation, User Requirements Documents, Data Modeling, Enterprise Architecture, Portfolio Management
Kennesaw State University
Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Data Security, Security Awareness, Information Privacy, Encryption
- Status: New
Vanderbilt University
Skills you'll gain: Crisis Management, Incident Response, ChatGPT, Generative AI, Cross-Functional Collaboration, Prompt Engineering, Threat Modeling, Cyber Security Strategy, Cybersecurity, Scenario Testing, Complex Problem Solving
Skills you'll gain: Incident Response, Incident Management, Cybersecurity, Human Factors (Security), Security Awareness, Continuous Monitoring, Cyber Security Strategy, Cyber Governance, Computer Security Awareness Training, Culture Transformation, Threat Detection, Organizational Change, Employee Training, Employee Engagement, Communication Strategies
Skills you'll gain: Computer Systems, Business Software, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Computer Hardware, Information Systems Security, Data Storage, Patch Management, Microsoft 365, Artificial Intelligence
Queen Mary University of London
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Cloud Security, Personally Identifiable Information, Data Security, Information Privacy, Cybersecurity, Cloud Services, Cloud Computing, Data Governance, Regulatory Requirements, Incident Management
Skills you'll gain: Cloud Computing, Linux, Linux Administration, Cloud Security, Operating Systems, Windows PowerShell, Windows Servers, File Systems, System Configuration, Mac OS, Command-Line Interface, Security Controls, Firewall, Virtualization and Virtual Machines, Containerization, User Accounts
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Information Privacy, Safety and Security, Multi-Factor Authentication
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Encryption, Data Integrity
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Information Systems Security, Intrusion Detection and Prevention, Endpoint Security, Network Infrastructure, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
Skills you'll gain: Peripheral Devices, Technical Support, Computer Hardware, Disaster Recovery, System Configuration, Hardware Troubleshooting, Microsoft Windows, Operating Systems, Linux, Networking Hardware, Computer Architecture, Mac OS, User Accounts
In summary, here are 10 of our most popular cybersecurity courses
- Cybersecurity Foundations & Threat Mitigation: Packt
- Information Systems: University of Minnesota
- Cybersecurity: Protecting your Information on the Go: Kennesaw State University
- ChatGPT + Cybersecurity: AI-Powered Tabletops & Training: Vanderbilt University
- The Cybersecurity Culture Blueprint: A Proactive Approach: LearnQuest
- Introduction to Computers and Operating Systems and Security: Microsoft
- Cloud Computing Law: Data Protection and Cybersecurity: Queen Mary University of London
- Operating Systems: Overview, Administration, and Security: IBM
- Cybersecurity: What to Do When You Are a Victim: Kennesaw State University
- Introduction to Cyber Attacks: New York University