Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Information Security Course Catalog
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Database Design, MySQL, Presentations, Descriptive Statistics, Extract, Transform, Load, Business Intelligence, IBM DB2, Tableau Software, Relational Databases, Star Schema, Data Visualization Software, Interactive Data Visualization, Regression Analysis, Data-Driven Decision-Making, Excel Formulas, Microsoft Excel
Multiple educators
Skills you'll gain: Dashboard, Pseudocode, Jupyter, Algorithms, Data Literacy, Data Mining, Pandas (Python Package), Data Visualization Software, Correlation Analysis, Web Scraping, NumPy, Probability & Statistics, Predictive Modeling, Big Data, Computer Programming Tools, Automation, Data Analysis Software, Data Collection, Machine Learning Algorithms, Unsupervised Learning
Skills you'll gain: Prompt Engineering, ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Large Language Modeling, Artificial Intelligence, Natural Language Processing, Program Development, Anomaly Detection, Vulnerability Management, Image Analysis, Content Creation, Virtual Environment
- Status: New AI skills
Google
Skills you'll gain: Computer Networking, Package and Software Management, Network Security, Network Troubleshooting, Systems Administration, Cloud Infrastructure, Network Administration, IT Infrastructure, TCP/IP, Information Systems Security, File Systems, Microsoft Windows, Desktop Support, Network Protocols, Lightweight Directory Access Protocols, Cybersecurity, Encryption, Computer Hardware, Technical Support, Software Installation
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Mobile Security, Enterprise Security, Computer Security, Cyber Risk, Cyber Security Policies, Network Architecture, Security Controls
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption
University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Cyber Security Policies, Systems Administration, Virtualization, Red Hat Enterprise Linux, Information Technology
- Status: Free
Infosec
Skills you'll gain: Blockchain, Network Security, Application Security, Threat Modeling, Cybersecurity, Cryptography, Secure Coding, Encryption, Vulnerability Assessments, Scalability, Distributed Computing, Data Integrity, Algorithms
- Status: Free
University of Copenhagen
Skills you'll gain: Research, Investigation, Record Keeping, Data Collection, Document Management, Information Management, Intellectual Property
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Security Management, Intelligence Collection and Analysis, International Relations, Public Safety and National Security, Safety and Security, Risk Management, Cybersecurity, Governance, Cultural Diversity, Economics, Policy, and Social Studies
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Application Specific Integrated Circuits, Cryptography, Encryption, Emerging Technologies, Authentications, System Design and Implementation, Computational Logic
University of Minnesota
Skills you'll gain: Cloud Security, Application Security, Network Security, Cloud Computing, Cybersecurity, Information Systems Security, Security Controls, Infrastructure Security, Remote Access Systems, Public Key Infrastructure, Cryptography, Vulnerability Assessments, Virtualization, Virtual Machines, Encryption, Authorization (Computing)
Information Security learners also search
In summary, here are 10 of our most popular information security courses
- IBM Business Intelligence (BI) Analyst:Â IBM
- Data Science Foundations:Â IBM
- IBM Generative AI for Cybersecurity Professionals:Â IBM
- Google IT Support:Â Google
- Introduction to Cyber Security:Â New York University
- Network Security:Â ISC2
- Computer Security and Systems Management:Â University of Colorado System
- Blockchain Security:Â Infosec
- Academic Information Seeking:Â University of Copenhagen
- International Security Management:Â Erasmus University Rotterdam