Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Cybersecurity Course Catalog
University of California San Diego
Skills you'll gain: Graph Theory, Logical Reasoning, Cryptographic Protocols, Combinatorics, Computational Logic, Deductive Reasoning, Cryptography, Probability, Computational Thinking, Encryption, Mathematical Theory & Analysis, Network Analysis, Public Key Cryptography Standards (PKCS), Algorithms, Theoretical Computer Science, Python Programming, Data Structures, Cybersecurity, Computer Programming, Mathematical Modeling
DeepLearning.AI
Skills you'll gain: Generative AI, PyTorch (Machine Learning Library), Image Analysis, Deep Learning, Artificial Neural Networks, Data Ethics, Applied Machine Learning, Computer Vision, Machine Learning, Computer Graphics, Data Transformation, Artificial Intelligence and Machine Learning (AI/ML), Information Privacy, Data Synthesis
- Status: Free
Princeton University
Skills you'll gain: Blockchain, Cryptography, Encryption, Payment Systems, FinTech, Key Management, Digital Assets, Network Protocols, Cybersecurity, Transaction Processing, Distributed Computing, Emerging Technologies, Scripting, Financial Regulation, Public Affairs, Market Dynamics
EC-Council
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Security Awareness, Cyber Threat Intelligence, Cybersecurity, Intrusion Detection and Prevention, Cyber Attacks, Application Security, Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
- Status: [object Object]
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, Operating Systems, Network Administration, Network Protocols, Application Security, Microsoft Teams, Productivity Software, Information Systems Security, Multi-Factor Authentication
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Stakeholder Communications, Incident Response, Intrusion Detection and Prevention, Threat Management, Business Risk Management, Network Security, Vulnerability Assessments, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Computer Security Incident Management, Security Awareness, Bash (Scripting Language), Event Monitoring, Security Controls, Cybersecurity, Debugging
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Data Integrity
Skills you'll gain: Hardware Troubleshooting, Computer Hardware, Peripheral Devices, System Configuration, Desktop Support, Technical Support, Disaster Recovery, Hardware Architecture, System Support, Networking Hardware, Operating Systems, Software Installation, Microsoft Windows, Information Technology, Linux Administration, USB, Computer Networking, Mac OS, Display Devices, Data Storage
University of London
Skills you'll gain: Computer Science, Computer Systems, Development Environment, Web Applications, Debugging, Graphing, Program Development, Computer Networking, Computational Thinking, Computer Programming Tools, Usability, Arithmetic, Applied Mathematics, Mathematical Modeling, Cybersecurity, Software Development Tools, Visualization (Computer Graphics), Computer Programming, Computer Graphics, Numerical Analysis
University of Minnesota
Skills you'll gain: Enterprise Resource Planning, Business Systems Analysis, Systems Analysis, Requirements Analysis, Cybersecurity, Business Requirements, Business Systems, Cyber Threat Intelligence, Cloud Computing, Cloud Services, IT Management, Change Management, Business Technologies, Organizational Change, Technology Strategies, System Implementation, User Requirements Documents, Information Technology, Portfolio Management, Governance
Skills you'll gain: Security Controls, Information Assurance, Cybersecurity, Risk Management Framework, Information Systems Security, Security Awareness, Cyber Governance, Security Management, Cyber Security Policies, Cyber Risk, Data Ethics, Data Integrity
Skills you'll gain: Cybersecurity, Network Security, Cyber Attacks, Cryptography, Threat Modeling, Information Systems Security, Identity and Access Management, Firewall, Encryption, Threat Detection, Public Key Infrastructure, Infrastructure Security, Security Controls, Authentications, Risk Management Framework, Authorization (Computing)
In summary, here are 10 of our most popular cybersecurity courses
- Introduction to Discrete Mathematics for Computer Science:Â University of California San Diego
- Generative Adversarial Networks (GANs):Â DeepLearning.AI
- Bitcoin and Cryptocurrency Technologies:Â Princeton University
- Ethical Hacking Essentials (EHE):Â EC-Council
- Microsoft IT Support Specialist:Â Microsoft
- Ciberseguridad de Google:Â Google
- Introduction to Cyber Attacks:Â New York University
- Introduction to Hardware and Operating Systems:Â IBM
- Introduction to Computer Science and Programming:Â University of London
- Information​ ​Systems: University of Minnesota