Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Cybersecurity Course Catalog
Fortinet, Inc.
Skills you'll gain: Network Troubleshooting, Firewall, Network Monitoring, Network Security, Network Administration, Virtual Private Networks (VPN), Security Engineering, Network Performance Management, Lightweight Directory Access Protocols, System Monitoring, Authentications, System Configuration, Malware Protection, Debugging
- Status: New
University of Illinois Urbana-Champaign
Skills you'll gain: Automation, Artificial Intelligence, Data Ethics, Advanced Analytics, Business Process Automation, Robotic Process Automation, Predictive Analytics, Machine Learning, Emerging Technologies, Cloud Computing, Internet Of Things, Computer Hardware, Cybersecurity, Logistics
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Cybersecurity, Cyber Attacks, Threat Modeling, Vulnerability Assessments, Network Security, Scenario Testing, Network Analysis, Problem Management
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Cyber Operations, Scripting, Cybersecurity, Vulnerability Assessments, Python Programming, Network Analysis, Automation
Infosec
Skills you'll gain: Security Controls, Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security, Personally Identifiable Information, Computer Security Awareness Training, Configuration Management, Document Management, Change Control
University of Colorado System
Skills you'll gain: Cryptography, Cryptographic Protocols, Encryption, Information Systems Security, Cybersecurity, Computer Security, Theoretical Computer Science
- Status: New
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Mobile Security, Cybersecurity, Penetration Testing, Cyber Threat Intelligence, Open Web Application Security Project (OWASP), Malware Protection, Threat Detection, Network Security, Threat Modeling, Threat Management, MITRE ATT&CK Framework, Cyber Attacks, Information Systems Security, Wireless Networks, Cryptography, Risk Management Framework, Encryption
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Application Security, Vulnerability Management, Secure Coding, Cybersecurity, Authorization (Computing), Cryptography, System Configuration, Encryption, Software Design, SQL
Palo Alto Networks
Skills you'll gain: Cyber Operations, Endpoint Detection and Response, Endpoint Security, Security Information and Event Management (SIEM), Zero Trust Network Access, Cybersecurity, Cyber Threat Intelligence, Threat Modeling, Continuous Monitoring, Security Controls, IT Security Architecture, Threat Detection, Incident Response, Malware Protection, Automation, Authentications, Data Lakes
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Skills you'll gain: Blockchain, Threat Modeling, Application Security, Computer Security, Security Controls, Security Testing, Cybersecurity, Security Requirements Analysis, Security Engineering, Data Security, Network Security, Information Systems Security, Cryptography, Vulnerability Assessments, Secure Coding, Cryptographic Protocols, Encryption, Transaction Processing, Key Management, Public Key Infrastructure
Infosec
Skills you'll gain: Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Application Security, Security Testing, Authorization (Computing), Authentications, Data Validation, Encryption, Security Software, Data Security, Hardening, Vulnerability Scanning, Security Controls, Role-Based Access Control (RBAC), Verification And Validation, Intrusion Detection and Prevention, Security Awareness, User Accounts, Web Applications, Configuration Management
In summary, here are 10 of our most popular cybersecurity courses
- Network Security Support Engineer:Â Fortinet, Inc.
- Advanced Topics in Artificial Intelligence:Â University of Illinois Urbana-Champaign
- CEH (v12) Practice Projects and Exam Simulators:Â LearnKartS
- Advanced Python - Reconnaissance:Â Infosec
- NIST 800-171:Â Infosec
- Cryptography and Information Theory:Â University of Colorado System
- Certified Ethical Hacker (CEH) v.12:Â Packt
- OWASP Top 10 - Welcome and Risks 1-5:Â Infosec
- Palo Alto Networks Security Operations Fundamentals:Â Palo Alto Networks
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System