Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Information Security Course Catalog
New York University
Skills you'll gain: Cyber Attacks, Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cybersecurity, IT Security Architecture, Cloud Security, NIST 800-53, Cyber Threat Intelligence, Hybrid Cloud Computing, Cloud Computing Architecture, Payment Card Industry (PCI) Data Security Standards, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Data Integrity
University of Minnesota
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cloud Computing, Cloud Services, IT Management, Information Technology, Technology Solutions, Technology Strategies, IT Infrastructure, Data Security, Information Systems, Emerging Technologies, Innovation, Business Transformation, Blockchain, Virtualization
University of London
Skills you'll gain: Network Security, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Encryption
University of California, Irvine
Skills you'll gain: Systems Development, Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Safety and Security, Information Technology, Information Privacy, Computer Security Awareness Training, Technology Strategies, Data Management, Digital Communications
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Penetration Testing, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Vulnerability Management, Personally Identifiable Information, Identity and Access Management, Web Applications, Data Validation
Skills you'll gain: Endpoint Security, Infrastructure Security, Security Management, Network Security, Security Controls, Data Security, Data Management, Security Strategy, Application Security, Cybersecurity, IT Infrastructure, Information Management, Enterprise Security, Data Integrity
Universidad de los Andes
Skills you'll gain: Cryptography, Security Requirements Analysis, Human Factors (Security), Encryption, Data Security, Security Management, Personally Identifiable Information, Threat Management, ISO/IEC 27001, Information Assurance, Cyber Attacks, Cybersecurity, Security Awareness, Law, Regulation, and Compliance
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Server Side, Vulnerability Assessments
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, MySQL, PostgreSQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Transformation, IBM DB2, Relational Databases, Jupyter, Generative AI
Skills you'll gain: Threat Modeling, IT Security Architecture, Secure Coding, Application Security, Security Testing, Security Strategy, Security Engineering, Threat Management, Software Architecture, Software Development Methodologies, Software Development Life Cycle, Systems Architecture, Software Testing, Penetration Testing, Business Risk Management, Compliance Management
Johns Hopkins University
Skills you'll gain: Email Security, Malware Protection, Mobile Security, Cybersecurity, Network Security, Internet Of Things, Open Web Application Security Project (OWASP), Network Monitoring, Intrusion Detection and Prevention, Security Controls, TCP/IP, Threat Detection, Network Analysis, Network Protocols, Border Gateway Protocol, Application Security, Information Systems Security, Threat Modeling, Network Routing, Governance
University of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Security Controls, Human Factors (Security), Asset Protection, Due Diligence
Information Security learners also search
In summary, here are 10 of our most popular information security courses
- Enterprise and Infrastructure Security:Â New York University
- IT Infrastructure and Emerging Trends:Â University of Minnesota
- Introduction to Network Security:Â University of London
- Data, Security, and Privacy:Â University of California, Irvine
- Identifying Security Vulnerabilities:Â University of California, Davis
- Security Infrastructure Management:Â Codio
- Principios y Regulaciones de Seguridad de la Información: Universidad de los Andes
- Software Security for Web Applications:Â Codio
- IBM Relational Database Administrator:Â IBM
- Designing Robust Information System Security Architectures:Â LearnQuest