Filter by
The language used throughout the course, in both instruction and assessments.
Explore the Cybersecurity Course Catalog
- Status: Free
Skills you'll gain: Cloud Computing Architecture, Cloud Security, Cloud Infrastructure, Cloud Computing, Cloud Applications, IT Security Architecture, Cloud Services, Infrastructure Security, Application Security, Data Security, Cybersecurity, Security Controls, Risk Management Framework, Encryption
Skills you'll gain: MITRE ATT&CK Framework, Network Security, Cybersecurity, Cyber Operations, Python Programming, Data Access, Authorization (Computing), Authentications, Scripting, Scripting Languages, Computer Programming, User Accounts
University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, TCP/IP, Network Analysis
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authorization (Computing), Cyber Risk, Authentications, Continuous Monitoring, Threat Management, Security Controls, Application Security, Cybersecurity, Cyber Attacks, Secure Coding, Cryptography, Security Testing, Data Security, Identity and Access Management, Vulnerability Management, Infrastructure Security
University of Florida
Skills you'll gain: Internet Of Things, Patient Safety, Healthcare Industry Knowledge, Vulnerability, Health Care, Data Ethics, Regulation and Legal Compliance, Health Systems, Law, Regulation, and Compliance, Information Systems Security, Threat Modeling, Vulnerability Assessments, Security Awareness, Emerging Technologies, Safety Assurance, Cybersecurity, Security Controls, Human Factors (Security), Ethical Standards And Conduct, Information Privacy
Amazon Web Services
Skills you'll gain: Cloud Computing Architecture, Amazon Web Services, Cloud Security, Solution Architecture, Cloud-Native Computing, Performance Tuning, System Requirements, DevOps, Site Reliability Engineering, Cybersecurity, Disaster Recovery
University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Information Systems Security, Cybersecurity, Encryption, Virtual Private Networks (VPN), Cyber Attacks, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
Skills you'll gain: Cyber Operations, Threat Management, Threat Detection, Cybersecurity, Scripting, IT Automation, Command-Line Interface, Python Programming, Network Security, Encryption
Skills you'll gain: Performance Tuning, Microarchitecture, Embedded Systems, Application Security, System Programming, System Configuration, Computer Architecture, Hardware Architecture, Cybersecurity
Skills you'll gain: Embedded Systems, Cybersecurity, Internet Of Things, Software Development, Electronic Components, Systems Integration, Debugging, C (Programming Language), Reliability, Real Time Data
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Security Strategy, Intrusion Detection and Prevention, Threat Management, Cybersecurity, Continuous Monitoring, Security Information and Event Management (SIEM), Technical Communication
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Public Key Infrastructure, Threat Modeling, Cryptography, Security Testing, Cyber Threat Intelligence, Mobile Security, Cybersecurity, Application Security, Vulnerability Assessments, Network Security, Threat Detection, Encryption, Operating Systems, Web Applications, Malware Protection, Technical Writing, Information Systems Security, Wireless Networks
In summary, here are 10 of our most popular cybersecurity courses
- Certified Cloud Security Professional (CCSP): Infosec
- Credential Access, discovery, lateral movement & collection: Infosec
- Introduction to Computer Security: University of London
- Cloud Top Ten Risks: University of Minnesota
- TECH MeD: Transdisciplinary Education for Critical Hacks of Medical Devices: University of Florida
- Capstone: Following the AWS Well Architected Framework: Amazon Web Services
- Security and Privacy in TOR Network: University of Colorado System
- Python for Command-and-control, Exfiltration and Impact: Infosec
- Advanced Armv8-M Features: Arm
- Introduction to Automotive Embedded Systems: Starweaver