Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Cybersecurity Course Catalog
University of Leeds
Skills you'll gain: Cryptographic Protocols, Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Data Security, Authentications, Data Integrity
Skills you'll gain: Penetration Testing, Network Security, Wireless Networks, Network Administration, Cybersecurity, Vulnerability Assessments, Computer Networking, Linux Administration, Linux, Encryption, Network Analysis, Command-Line Interface, Virtual Machines
Skills you'll gain: NoSQL, Databases, Relational Databases, Database Architecture and Administration, Database Management, Data Storage Technologies, Data Management, Scalability
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Zero Trust Network Access, Application Deployment, Network Protocols, Identity and Access Management, Software Installation, Infrastructure Architecture, Solution Architecture, Linux
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Application Security, Vulnerability Assessments, Vulnerability Management, Extensible Markup Language (XML), Scripting, Cybersecurity
LearnQuest
Skills you'll gain: Blockchain, Cryptography, Data Storage, Network Architecture, FinTech, Distributed Computing, Cybersecurity, Programming Principles, Emerging Technologies, Scalability, Data Integrity
Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Information Systems Security Assessment Framework (ISSAF), Cryptography, Security Controls, Cloud Security, Encryption, Data Security, Cybersecurity, Identity and Access Management, Cloud Computing, Penetration Testing, Vulnerability Scanning, Authorization (Computing), Incident Management
Fortinet, Inc.
Skills you'll gain: Firewall, Network Security, Virtual Private Networks (VPN), Network Administration, Intrusion Detection and Prevention, Network Infrastructure, Enterprise Security, Network Architecture, System Configuration, Security Software, Performance Tuning, Hardware Architecture
- Status: New
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Vulnerability Assessments, Information Systems Security, Event Monitoring, Applied Machine Learning, Network Security
Universidades Anáhuac
Skills you'll gain: Malware Protection, Information Systems Security, Cybersecurity, Cyber Attacks, Computer Security Awareness Training, Data Security, Security Awareness, Information Assurance, Network Security, Threat Modeling, Human Factors (Security)
Skills you'll gain: Emerging Technologies, Technology Strategies, Digital Transformation, Business Transformation, Business Solutions, Business Strategies, Real Time Data, Internet Of Things, Cybersecurity, Wireless Networks, Operational Efficiency, Artificial Intelligence
- Status: New
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Information Systems Security, Command-Line Interface, Security Controls, Virtual Private Networks (VPN), Hardening, Firewall, Vulnerability Scanning, Local Area Networks, Vulnerability Assessments, Zero Trust Network Access, Wireless Networks, Malware Protection, Threat Detection, Security Information and Event Management (SIEM), Encryption, Network Analysis
In summary, here are 10 of our most popular cybersecurity courses
- An Introduction to Cryptography:Â University of Leeds
- Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux:Â Packt
- Vector Databases: An Introduction with Chroma DB:Â IBM
- Check Point Jump Start: Harmony Endpoint Security:Â Check Point Software Technologies Ltd.
- Previous OWASP Risks:Â Infosec
- Fundamentals of Blockchain Architecture:Â LearnQuest
- Protection of Information Assets:Â Packt
- Enterprise Firewall Administrator:Â Fortinet, Inc.
- Intrusion Detection:Â Johns Hopkins University
- Escudo Digital: Ciberseguridad para datos y sistemas: Universidades Anáhuac