Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Cybersecurity Course Catalog
- Status: Free
Infosec
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Detection, Threat Modeling, MITRE ATT&CK Framework, Endpoint Detection and Response, Cybersecurity, Malware Protection, Security Information and Event Management (SIEM), Anomaly Detection, Generative AI, Network Analysis
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Cyber Operations, Scripting, Cybersecurity, Python Programming, Network Analysis, Automation
University of Michigan
Skills you'll gain: Security Engineering, Computer Security Awareness Training, Cybersecurity, Security Strategy, Policy Analysis, Vulnerability Assessments, Public Policies, Human Factors, Computer Systems, Human Computer Interaction, Usability, Verification And Validation
Queen Mary University of London
Skills you'll gain: Cloud Services, Cloud Computing, Cloud Computing Architecture, Contract Negotiation, Cloud Security, Vendor Contracts, Cyber Risk, Infrastructure As A Service (IaaS), Contract Review, Law, Regulation, and Compliance, Contract Management, Regulation and Legal Compliance, Service Level Agreement, Data Security, Data Governance
- Status: Free
Infosec
Skills you'll gain: Blockchain, Network Security, Application Security, Security Engineering, Computer Security, Infrastructure Security, Information Systems Security, Cybersecurity, Data Security, Cryptography, Cryptographic Protocols, Secure Coding, Encryption, Vulnerability Assessments, Scalability, Distributed Computing, Data Integrity, Other Programming Languages, Algorithms
Skills you'll gain: Malware Protection, Cyber Threat Hunting, Application Security, Cybersecurity, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Windows PowerShell, Virtualization, Operating Systems, Programming Principles, Computer Architecture, Linux
Skills you'll gain: Azure Active Directory, Active Directory, Microsoft Azure, Security Controls, Identity and Access Management, Security Information and Event Management (SIEM), Generative AI, Cloud Security, Data Governance, Authentications, Network Security, Role-Based Access Control (RBAC), Data Security, Cybersecurity, System Monitoring, Threat Detection, Multi-Factor Authentication, Encryption
Skills you'll gain: Technical Support, Technical Support and Services, Hardware Troubleshooting, Cloud Computing, Desktop Support, Cybersecurity, Help Desk Support, System Support, Network Troubleshooting, Computer Hardware, Network Administration, General Networking, Data Storage, Issue Tracking, Operating Systems
Skills you'll gain: Security Information and Event Management (SIEM), Splunk, Threat Detection, Cybersecurity, Event Monitoring, Continuous Monitoring, Incident Response, Data Analysis Software, Data Management, Real Time Data, Data Storage, Software Installation, Query Languages, User Interface (UI)
University of Michigan
Skills you'll gain: Manufacturing Operations, Digital Transformation, Technology Strategies, Business Modeling, Production Process, Product Lifecycle Management, Asset Management, Internet Of Things, Business Metrics, Simulation and Simulation Software, Real Time Data, Risk Analysis, Systems Integration, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML)
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Data Integrity, Security Testing, Cybersecurity, Patch Management, Authorization (Computing), Network Security, Cryptography, Extensible Markup Language (XML), System Configuration, Scripting, Encryption, Software Design
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management
In summary, here are 10 of our most popular cybersecurity courses
- Cyber Threat Hunting:Â Infosec
- Advanced Python - Reconnaissance:Â Infosec
- Securing Digital Democracy:Â University of Michigan
- Cloud Computing Law: Transactions:Â Queen Mary University of London
- Blockchain Security:Â Infosec
- Malware Analysis and Introduction to Assembly Language:Â IBM
- Microsoft SC-900 Exam Preparation and Practice:Â Microsoft
- Technical Support (IT) Case Studies and Capstone:Â IBM
- Introduction to SIEM (Splunk):Â EDUCBA
- Digital Twins:Â University of Michigan