Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Find the Best Cybersecurity Course for Your Goals
University of London
Skills you'll gain: Computer Science, Computer Systems, Web Applications, Computer Networking, Computational Thinking, Theoretical Computer Science, Human Computer Interaction, Hardware Architecture, Operating Systems, Cybersecurity, Problem Management, Software Architecture
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cyber Security Policies, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Identity and Access Management, Network Security, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Intrusion Detection and Prevention, Scenario Testing, Virtual Machines, Encryption
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Software Design Patterns
Skills you'll gain: Incident Response, Business Continuity, Disaster Recovery, Cybersecurity, Security Management, Crisis Management, Information Assurance
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption
Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Security Requirements Analysis, Penetration Testing, Information Systems Security, Human Factors (Security), Cybersecurity, Threat Detection, Cloud Security, Vulnerability Assessments, Threat Modeling, Encryption, Vulnerability Management, Cyber Security Assessment, Risk Management Framework, Data Security, Security Management
University of California, Irvine
Skills you'll gain: Systems Development, Systems Development Life Cycle, Agile Methodology, Productivity Software, Network Security, Computer Hardware, Hardware Architecture, Computer Systems, Data Security, Risk Management, System Design and Implementation, Information Technology, Software Development Methodologies, Data Ethics, Cybersecurity, System Software, General Networking, Information Privacy, Information Systems, Workflow Management
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Stakeholder Communications, Vulnerability Assessments, Threat Detection, Hardening, Network Security, Security Controls, Threat Management, Security Information and Event Management (SIEM), TCP/IP, Risk Management Framework, Bash (Scripting Language), Linux, Debugging, Cybersecurity
Skills you'll gain: Information Technology, Computer Hardware, Cloud Computing, Network Troubleshooting, Software Installation, Technical Support and Services, Cybersecurity, Hardware Troubleshooting, Data Storage, Database Software, Operating Systems, Computer Networking, Computer Security Awareness Training, IT Infrastructure
Vanderbilt University
Skills you'll gain: Prompt Engineering, Generative AI, ChatGPT, Artificial Intelligence, Innovation, Large Language Modeling, Creativity, Creative Problem-Solving, Human Machine Interfaces, Collaboration, Natural Language Processing
Skills you'll gain: Splunk, Security Information and Event Management (SIEM), Data Modeling, Role-Based Access Control (RBAC), System Monitoring, Dashboard, Incident Response, Threat Detection, User Accounts, Data Transformation, Cybersecurity, Machine Learning, Performance Tuning, Data Visualization, Event Monitoring, Data Manipulation, Data Analysis, Identity and Access Management, Statistical Analysis, Query Languages
Cisco Learning and Certifications
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Malware Protection, Network Monitoring, Network Administration, TCP/IP, Network Infrastructure, Infrastructure Security, Intrusion Detection and Prevention, Network Protocols, Load Balancing, Firewall, Authorization (Computing), Web Applications, Security Controls, Authentications
In summary, here are 10 of our most popular cybersecurity courses
- How Computers Work:Â University of London
- Azure Cybersecurity Solutions And Microsoft Defender :Â Microsoft
- Fundamentals of Computer Network Security:Â University of Colorado System
- Incident Response, BC, and DR Concepts:Â ISC2
- Network Security:Â ISC2
- Ciberseguridad:Â Universidad de los Andes
- Introduction to Computer Information Systems:Â University of California, Irvine
- Cybersécurité Google: Google
- Information Technology (IT) Fundamentals for Everyone:Â IBM
- Generative AI Primer:Â Vanderbilt University