Cybersecurity

Cybersecurity courses can help you learn how to protect networks, systems, and data from digital threats and security breaches.
134credentials
2online degrees
434courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Find the best Cybersecurity course for your goals

  • Status: New
    Status: Free Trial

    Skills you'll gain: Threat Detection, Cyber Threat Intelligence, Threat Management, Vulnerability Assessments, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Cybersecurity, Security Strategy, Risk Mitigation, Emergency Response, System Configuration, Software Installation, Network Analysis, Technical Writing

  • Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Configuration Management, Data Ethics, Data Integrity, Identity and Access Management

  • Status: New
    Status: Free Trial

    Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Encryption, Cloud Security, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

  • Status: New
    Status: Free Trial

    Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Cyber Attacks, Wireless Networks, Application Security, Network Monitoring, Linux, Object Oriented Programming (OOP), Vulnerability Assessments, Cyber Security Assessment, Intrusion Detection and Prevention

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Test Tools, Human Factors (Security)

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Information Systems Security, Software Installation, Virtual Machines

  • Status: Free Trial

    Skills you'll gain: Malware Protection, Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Penetration Testing, Intrusion Detection and Prevention, Firewall, Threat Detection, Endpoint Security, Exploitation techniques, Internet Of Things, Network Protocols

  • Status: Free Trial

    Skills you'll gain: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, Cyber Governance, Intrusion Detection and Prevention, Risk Management Framework, Cyber Threat Intelligence, Network Infrastructure, Network Security, Security Information and Event Management (SIEM)

  • Status: Free Trial

    Skills you'll gain: Risk Analysis, Risk Management, Threat Management, Threat Modeling, Cyber Risk, Security Management, Governance, Cybersecurity, Cyber Security Strategy, Asset Management, Cyber Security Assessment, Project Documentation, Presentations

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Applied Machine Learning, Network Analysis, Data Analysis

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security

  • Status: Free Trial

    Infosec

    Skills you'll gain: Cyber Governance, Security Management, Information Systems Security, Cybersecurity, Governance, Cyber Security Strategy, Cyber Risk, Information Assurance, Leadership, Change Management, Business Leadership

Related roles

Gain the knowledge and skills you need to advance.

  • This role has a $118,656 median salary ¹.

    description:

    A Cyber Security Specialist monitors systems, responds to incidents, enforces policies, and protects data from unauthorized access and cyber threats.

    This role has a $118,656 median salary ¹.

    Offered by

    IBM_logo
    ISC2_logo
  • This role has a $115,456 median salary ¹.

    description:

    A Cyber Security Analyst monitors IT systems, analyzes threats, finds vulnerabilities, and implements measures to protect data from cyber attacks.

    This role has a $115,456 median salary ¹.

    Offered by

    Google_logo
    Microsoft_logo
    IBM_logo

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • Infosec
  • LearnQuest
  • Pearson
  • IBM
  • Google Cloud
  • Google
  • Kennesaw State University