• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
Log In
Join for Free
Coursera
  • Browse
  • Cybersecurity

Cybersecurity Courses

Cybersecurity courses can help you learn how to protect networks, systems, and data from digital threats and security breaches.

Skip to search results

Filter by

Subject
Required
 *

Language
Required
 *

The language used throughout the course, in both instruction and assessments.

Learning Product
Required
 *

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required
 *

Duration
Required
 *

Skills
Required
 *

Subtitles
Required
 *

Educator
Required
 *

Find the best Cybersecurity course for your goals

  • Status: Preview
    Preview
    C

    Coursera Instructor Network

    Introduction to Data Protection and Privacy

    Skills you'll gain: General Data Protection Regulation (GDPR), Personally Identifiable Information, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Data Ethics, Cyber Governance, Security Controls, Cyber Risk, Data Access, Encryption, Risk Management Framework

    4.7
    Rating, 4.7 out of 5 stars
    ·
    65 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    C

    Cisco Learning and Certifications

    Threat Analysis

    Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Threat Management, Exploit development, Computer Security Incident Management, Network Analysis, Cybersecurity, Network Security, Network Monitoring, SQL

    4.9
    Rating, 4.9 out of 5 stars
    ·
    34 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    C

    Cisco Learning and Certifications

    Data Security

    Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Cybersecurity, Network Security, Security Information and Event Management (SIEM), Network Monitoring, Network Analysis, Intrusion Detection and Prevention, Event Monitoring, Continuous Monitoring, Threat Detection, Incident Response

    4.8
    Rating, 4.8 out of 5 stars
    ·
    61 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Certified Ethical Hacker (CEH) v.12

    Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security

    4.7
    Rating, 4.7 out of 5 stars
    ·
    23 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    IBM

    Incident Response and Defense with OpenVAS

    Skills you'll gain: Threat Detection, Cyber Threat Intelligence, Threat Management, Vulnerability Assessments, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Cybersecurity, Security Strategy, Risk Mitigation, Emergency Response, System Configuration, Software Installation, Network Analysis, Technical Writing

    5
    Rating, 5 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 4 Weeks

  • C

    Coursera Project Network

    Introduction to Bash Shell Scripting

    Skills you'll gain: Bash (Scripting Language), Shell Script, Unix Shell, Scripting, Linux Commands, Unix Commands, Scripting Languages, Command-Line Interface, Linux, File Management, Unix, File Systems

    4.5
    Rating, 4.5 out of 5 stars
    ·
    676 reviews

    Beginner · Guided Project · Less Than 2 Hours

  • I

    ISC2

    Security Concepts and Practices

    Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Configuration Management, Data Ethics, Data Integrity, Identity and Access Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    101 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH)

    Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Encryption, Cloud Security, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

    Intermediate · Specialization · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Packt

    The Complete Ethical Hacking Course

    Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Cyber Attacks, Wireless Networks, Application Security, Network Monitoring, Linux, Object Oriented Programming (OOP), Vulnerability Assessments, Cyber Security Assessment, Intrusion Detection and Prevention

    4.4
    Rating, 4.4 out of 5 stars
    ·
    10 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Cloud Security Risks: Identify and Protect Against Threats

    Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis

    4.3
    Rating, 4.3 out of 5 stars
    ·
    44 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Introduction to Penetration Testing and Ethical Hacking

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Test Tools, Human Factors (Security)

    3.6
    Rating, 3.6 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    IBM

    Exploitation and Penetration Testing with Metasploit

    Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Information Systems Security, Software Installation, Virtual Machines

    3.9
    Rating, 3.9 out of 5 stars
    ·
    13 reviews

    Intermediate · Course · 1 - 3 Months

Cybersecurity learners also search

cybersecurity projects
advanced cybersecurity
beginner cybersecurity
computer security
information security
internet security
network security
web security
1…252627…61

In summary, here are 10 of our most popular cybersecurity courses

  • Introduction to Data Protection and Privacy: Coursera Instructor Network
  • Threat Analysis: Cisco Learning and Certifications
  • Data Security: Cisco Learning and Certifications
  • Certified Ethical Hacker (CEH) v.12: Packt
  • Incident Response and Defense with OpenVAS: IBM
  • Introduction to Bash Shell Scripting: Coursera Project Network
  • Security Concepts and Practices: ISC2
  • Certified Ethical Hacker (CEH): Pearson
  • The Complete Ethical Hacking Course: Packt
  • Cloud Security Risks: Identify and Protect Against Threats: Google Cloud

Skills you can learn in Computer Security And Networks

Cybersecurity (33)
Google (25)
Google Cloud Platform (17)
Internet (17)
Cryptography (16)
Network Security (16)
Linux (12)
Software Testing (12)
Information Security (10)
Application Programming Interfaces (8)
Kubernetes (8)
Web (8)

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok