Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Information Security Course Catalog
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Linux Commands, Database Design, IBM Cognos Analytics, MySQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Store, IBM DB2, Relational Databases, Dashboard, File Management, Star Schema
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Threat Detection, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Enterprise Risk Management (ERM), Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
Skills you'll gain: MySQL, Database Design, Version Control, Database Management Systems, Database Management, MySQL Workbench, Extract, Transform, Load, Data Modeling, Data Structures, SQL, Unix Commands, Relational Databases, Databases, Git (Version Control System), Database Systems, Stored Procedure, Object Oriented Programming (OOP), Unit Testing, Algorithms, Django (Web Framework)
University of Michigan
Skills you'll gain: Network Security, OSI Models, Network Administration, Network Protocols, Network Architecture, TCP/IP, Web Applications, Computer Networking, Encryption, Internet Of Things, Web Development, Innovation, Emerging Technologies, Hypertext Markup Language (HTML)
Google Cloud
Skills you'll gain: Generative AI, Application Development, Artificial Intelligence, Google Cloud Platform, Machine Learning Methods
Skills you'll gain: Stakeholder Engagement, Software Development Life Cycle, Agile Software Development, Project Management Life Cycle, Resource Management, Risk Management, Peer Review, Earned Value Management, Stakeholder Management, Agile Methodology, Project Risk Management, Team Motivation, Kanban Principles, Project Schedules, Resource Planning, Development Environment, Information Technology, Sprint Retrospectives, Interviewing Skills, Project Management
University of California, Davis
Skills you'll gain: Data Governance, Presentations, Data Cleansing, Feature Engineering, SQL, Apache Spark, A/B Testing, Distributed Computing, Descriptive Statistics, Data Lakes, Data Quality, Data Storytelling, Data Analysis, Peer Review, Exploratory Data Analysis, Data Manipulation, Data Pipelines, Databricks, Database Design, Query Languages
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Threat Management, Threat Detection, Security Controls, Cyber Governance, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
Skills you'll gain: Data Cleansing, Sampling (Statistics), Data Integrity, Data Quality, Data Validation, Sample Size Determination, Data Analysis, Data Manipulation, SQL, Data Transformation, Spreadsheet Software
Skills you'll gain: Software Development Life Cycle, Agile Software Development, User Story, Sprint Retrospectives, Agile Methodology, DevOps, Kanban Principles, Development Environment, Information Technology, Software Engineering, Computer Hardware, Agile Project Management, Software Development Tools, Software Development Methodologies, Software Architecture, Software Design, Sprint Planning, Cloud Computing, Backlogs, Cloud-Native Computing
Kennesaw State University
Skills you'll gain: Network Security, Network Administration, Security Management, Firewall, Network Monitoring, Cybersecurity, General Networking, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, System Monitoring, Security Awareness, TCP/IP, Intrusion Detection and Prevention, Cloud Computing, Threat Detection
- Status: Free
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), Automation, Event Monitoring, Cyber Threat Hunting, Continuous Monitoring, System Monitoring, Anomaly Detection, Cybersecurity, Data Analysis Software, Artificial Intelligence and Machine Learning (AI/ML)
Information Security learners also search
In summary, here are 10 of our most popular information security courses
- IBM Data Warehouse Engineer:Â IBM
- Cybersecurity: Developing a Program for Your Business:Â Kennesaw State University
- Meta Database Engineer:Â Meta
- Internet History, Technology, and Security:Â University of Michigan
- Introduction to Generative AI :Â Google Cloud
- IBM IT Project Manager:Â IBM
- Learn SQL Basics for Data Science:Â University of California, Davis
- The Foundations of Cybersecurity:Â Kennesaw State University
- Process Data from Dirty to Clean:Â Google
- IBM IT Scrum Master:Â IBM