Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Information Security Course Catalog
- Status: AI skills
Skills you'll gain: Dashboard, Data Visualization Software, Data Wrangling, Data Visualization, SQL, Supervised Learning, Feature Engineering, Plotly, Interactive Data Visualization, Jupyter, Exploratory Data Analysis, Data Mining, Data Cleansing, Matplotlib, Data Analysis, Unsupervised Learning, Generative AI, Pandas (Python Package), Data Manipulation, Professional Networking
Skills you'll gain: Desktop Support, Computer Hardware, Technical Support, Software Installation, Technical Documentation, Hardware Troubleshooting, Computer Networking, Information Technology, Technical Communication, Software Systems, Linux, Microsoft Windows
EC-Council
Skills you'll gain: Network Security, Mobile Security, Public Key Infrastructure, Cryptography, Security Controls, Cybersecurity, Authorization (Computing), Authentications, Identity and Access Management, Wireless Networks, Cloud Computing, Cloud Security, Network Monitoring, Data Security, Internet Of Things, Virtualization and Virtual Machines
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Databases, Software Architecture, Secure Coding, Software Design Patterns, Systems Design, Software Engineering, Software Development Tools, Software Development Life Cycle, Technical Design, Security Engineering
Skills you'll gain: Generative AI, Data Wrangling, Unit Testing, Supervised Learning, Feature Engineering, ChatGPT, Keras (Neural Network Library), Unsupervised Learning, Natural Language Processing, Data Cleansing, Jupyter, Data Analysis, Deep Learning, Data Manipulation, PyTorch (Machine Learning Library), Data Transformation, Artificial Intelligence, Data Import/Export, Data Ethics, Exploratory Data Analysis
Skills you'll gain: CI/CD, Istio, Open Web Application Security Project (OWASP), Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Kubernetes, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Jenkins, Bash (Scripting Language), Cloud Services, DevOps, Git (Version Control System), Jupyter, Grafana
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Security, Cloud Infrastructure, Data Mining, Cloud Platforms, Cloud Computing, Artificial Intelligence, Generative AI, Data Ethics, OpenAI, Cloud Storage, Artificial Intelligence and Machine Learning (AI/ML), Infrastructure As A Service (IaaS), Big Data, Emerging Technologies, Data Analysis, Data Science, Deep Learning, Digital Transformation
Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Secure Coding, Application Security, Identity and Access Management, Information Systems Security Assessment Framework (ISSAF), Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Systems Architecture, Security Strategy, Security Engineering, Zero Trust Network Access, Security Awareness, Threat Management, Security Information and Event Management (SIEM), Risk Management Framework, Disaster Recovery
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Application Security, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls
Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, NIST 800-53, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR), Business Ethics
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Business Analytics, Spreadsheet Software, Data Sharing, Data Cleansing, Data Processing, Data Visualization Software, Ethical Standards And Conduct, SQL
University of California, Irvine
Skills you'll gain: Systems Development Life Cycle, Agile Methodology, Productivity Software, Network Security, Computer Hardware, Hardware Architecture, Computer Systems, Data Security, Systems Design, Systems Development, Risk Management, System Design and Implementation, TCP/IP, Information Technology, Software Development Methodologies, Data Ethics, Cybersecurity, System Software, General Networking, Safety and Security
Information Security learners also search
In summary, here are 10 of our most popular information security courses
- IBM Data Science:Â IBM
- Technical Support Fundamentals:Â Google
- Network Defense Essentials (NDE):Â EC-Council
- Secure Software Design:Â University of Colorado System
- IBM Generative AI Engineering:Â IBM
- IBM DevOps and Software Engineering:Â IBM
- Key Technologies for Business:Â IBM
- Designing Information System Security Architectures:Â LearnQuest
- Fundamentals of Computer Network Security:Â University of Colorado System
- Cybersecurity Compliance Framework, Standards & Regulations:Â IBM