Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Information Security Course Catalog
Skills you'll gain: Desktop Support, Computer Hardware, Technical Support, Software Installation, Technical Documentation, Hardware Troubleshooting, Computer Networking, Information Technology, Technical Communication, Software Systems, Linux, Microsoft Windows
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Google Sheets, Business Analytics, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Strategy, Data Visualization Software, SQL
Skills you'll gain: Data Mining, Artificial Intelligence, Generative AI, Data Ethics, Artificial Intelligence and Machine Learning (AI/ML), Big Data, Information Architecture, Strategic Decision-Making, Cloud Computing, Data Analysis, Data Science, Deep Learning, Digital Transformation, Data Strategy, Data-Driven Decision-Making, Artificial Neural Networks, Business Strategy, Business Process Automation, Technology Strategies, Governance
Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, General Networking, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)
Skills you'll gain: SQL, Web Scraping, Data Transformation, Extract, Transform, Load, Data Architecture, Jupyter, Data Pipelines, Big Data, Data Warehousing, Data Governance, Relational Databases, Data Storage Technologies, Apache Hadoop, Databases, Data Manipulation, Stored Procedure, Database Management, Database Design, Automation, Python Programming
Skills you'll gain: SQL, Jupyter, Data Mining, Peer Review, Data Modeling, Relational Databases, Databases, Stored Procedure, Database Management, Database Design, Data Science, Big Data, Data Cleansing, Data Visualization Software, Software Development Tools, Query Languages, GitHub, Business Analysis, Cloud Computing, Data Analysis
University of Colorado System
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Risk Management, Enterprise Security, Cyber Security Assessment, Vulnerability Assessments, Encryption, Network Security, Data Security, Cryptography, Security Awareness, Information Assurance
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Cyber Risk, Threat Detection, Security Controls, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
The State University of New York
Skills you'll gain: Brainstorming, Presentations, Planning, Information Management, Research, Critical Thinking, Literacy, Analytical Skills, Ethical Standards And Conduct, Style Guides
Kennesaw State University
Skills you'll gain: Network Security, Security Management, Firewall, Network Monitoring, Cybersecurity, General Networking, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, System Monitoring, Intrusion Detection and Prevention, Cloud Computing, Threat Detection, Cryptography
University of Illinois Urbana-Champaign
Skills you'll gain: Text Mining, Natural Language Processing, Data Mining, Unstructured Data, Big Data, Web Analytics and SEO, Machine Learning, Information Architecture, Statistical Methods, Probability & Statistics
University of Minnesota
Skills you'll gain: Cloud Security, Application Security, Network Security, Cloud Computing, Cybersecurity, Information Systems Security, Infrastructure Security, Public Key Infrastructure, Cryptography, Private Cloud, Vulnerability Assessments, Virtualization, Virtual Machines, Authentications, Encryption, Authorization (Computing)
Information Security learners also search
In summary, here are 10 of our most popular information security courses
- Technical Support Fundamentals:Â Google
- Foundations: Data, Data, Everywhere:Â Google
- IBM AI Foundations for Business:Â IBM
- Connect and Protect: Networks and Network Security:Â Google
- Data Engineering Foundations:Â IBM
- Introduction to Data Science:Â IBM
- Introduction to Cybersecurity for Business:Â University of Colorado System
- The Foundations of Cybersecurity:Â Kennesaw State University
- Basic Information Literacy:Â The State University of New York
- Managing Network Security:Â Kennesaw State University