Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Information Security Course Catalog
Status: PreviewSkills you'll gain: Data Sharing, Data Management, Information Management, Data Storage, Data Quality, Metadata Management, Data Collection, General Science and Research, Data Literacy, Technical Communication
Status: Free TrialUniversity of Michigan
Skills you'll gain: Matplotlib, Network Analysis, Social Network Analysis, Feature Engineering, Data Visualization, Data Visualization Software, Interactive Data Visualization, Scientific Visualization, Pandas (Python Package), Applied Machine Learning, Supervised Learning, Text Mining, Visualization (Computer Graphics), Statistical Visualization, Jupyter, NumPy, Graph Theory, Natural Language Processing, Python Programming, Data Processing
Status: NewStatus: Free TrialSkills you'll gain: Unix, Unix Commands, Network Protocols, Network Troubleshooting, TCP/IP, OS Process Management, File Management, General Networking, File Transfer Protocol (FTP), Network Administration, Linux, Operating Systems, Network Security
Status: Free TrialSkills you'll gain: Dataflow, Data Pipelines, Serverless Computing, Data Processing, Performance Tuning, Cloud Security, Identity and Access Management, Unit Testing, Data Infrastructure, CI/CD, Debugging, Containerization, Real Time Data, Maintainability, System Monitoring, Data Transformation, Data Storage Technologies, Jupyter, Disaster Recovery, Google Cloud Platform
Status: Free TrialSkills you'll gain: Cloud Applications, Serverless Computing, Cloud Development, Cloud API, Cloud Services, Cloud Security, Application Deployment, Identity and Access Management, Operational Databases, Event-Driven Programming, Performance Tuning, Scalability
Status: NewStatus: Free TrialSkills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security), Network Analysis
Status: Free TrialUniversity of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Health Insurance Portability And Accountability Act (HIPAA) Compliance, General Data Protection Regulation (GDPR), Medical Privacy, Regulation and Legal Compliance, Legal Risk, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Compliance Reporting, Law, Regulation, and Compliance, Regulatory Compliance, Regulatory Requirements, Compliance Auditing, Internal Communications, Procedure Development, Business Ethics, Risk Management, Business Strategy
Status: Free TrialSkills you'll gain: Software Development Life Cycle, Open Web Application Security Project (OWASP), Node.JS, Containerization, Istio, Software Architecture, Application Deployment, Kubernetes, Cloud-Native Computing, Responsive Web Design, NoSQL, OpenShift, Restful API, Git (Version Control System), Cloud Applications, Ajax, Grafana, Javascript, Azure DevOps, Engineering Software
Status: Free TrialMicrosoft
Skills you'll gain: Microsoft Power Platform, Power BI, Microsoft Power Automate/Flow, Generative AI Agents, No-Code Development, Systems Integration, Application Design

Coursera Project Network
Skills you'll gain: Microsoft Azure, Virtual Machines, Data Storage Technologies, Cloud Storage, Cloud Computing, Virtualization and Virtual Machines, Disaster Recovery, Cloud Infrastructure, Cloud Services

Coursera Project Network
Skills you'll gain: Load Balancing, Network Routing, Amazon Web Services, Servers, Network Monitoring
Status: NewStatus: PreviewEDUCBA
Skills you'll gain: Remote Access Systems, Command-Line Interface, System Monitoring, Unix Commands, User Accounts, Linux, Linux Administration, Shell Script, Linux Commands, Operating System Administration, Systems Administration, Software Installation, File Systems, System Configuration, Data Sharing, Security Controls, Operating Systems, File Management
Information Security learners also search
In summary, here are 10 of our most popular information security courses
- Gestão de Dados Científicos: Insper
- Applied Data Science with Python: University of Michigan
- Unix Processes and Communications: EDUCBA
- Serverless Data Processing with Dataflow en Español: Google Cloud
- Developing Applications with Cloud Run Functions on Google Cloud: Google Cloud
- Certified Ethical Hacker (CEH): Unit 4: Pearson
- Regulatory Compliance: University of Pennsylvania
- IBM JavaScript Backend Developer: IBM
- The PL-900 Practice Exam: Microsoft
- Implementing Microsoft Azure Backup: Coursera Project Network










