Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Information Security Course Catalog
Status: PreviewThe Chinese University of Hong Kong
Skills you'll gain: Communication Systems, Digital Communications, Theoretical Computer Science, Telecommunications, Informatics, Probability, Probability Distribution, Algorithms, General Mathematics
Status: Free TrialSkills you'll gain: Cloud Computing Architecture, Cloud Services, Generative AI, Cloud Security, Cloud Platforms, Cybersecurity, Cloud Hosting, Cloud Engineering, Network Protocols, Cloud Computing, Network Security, Peripheral Devices, Computer Hardware, Windows Servers, System Configuration, Artificial Intelligence, Cyber Attacks, OSI Models, Cloud Infrastructure, Computer Programming
Status: Free TrialCalifornia Institute of the Arts
Skills you'll gain: Information Architecture, Persona (User Experience), UI/UX Strategy, Web Design, User Experience, Wireframing, User Research, User Centered Design, Mockups, Usability Testing, Requirements Analysis, Target Audience, Agile Methodology
Status: FreeAmazon Web Services
Skills you'll gain: Generative AI, Productivity Software, AI Product Strategy, Amazon Web Services

Amazon Web Services
Skills you'll gain: Amazon Web Services, Web Applications, Cloud Services, Amazon Elastic Compute Cloud, Information Technology, Cloud Computing, Public Cloud, IT Infrastructure, Computer Systems, Amazon S3, Web Development, General Networking, Web Servers, Operating Systems, Servers, Virtualization, Data Centers, Hypertext Markup Language (HTML), Data Analysis, Project Management
Status: PreviewErasmus University Rotterdam
Skills you'll gain: Security Management, Intelligence Collection and Analysis, International Relations, Public Safety and National Security, Safety and Security, Risk Management, Cybersecurity, Governance, Cultural Diversity, Economics, Policy, and Social Studies

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Vulnerability Assessments, Application Specific Integrated Circuits, Exploit development, Cryptography, Systems Design, Encryption, Exploitation techniques, Technical Design, Emerging Technologies
Status: Free TrialSkills you'll gain: Information Technology, Computer Hardware, Cloud Computing, Network Troubleshooting, Software Installation, Technical Support and Services, Cybersecurity, Hardware Troubleshooting, Data Storage, Database Software, Operating Systems, Computer Networking, IT Infrastructure, Virtual Private Networks (VPN), Project Management
Status: Free TrialUniversity of Minnesota
Skills you'll gain: Cloud Security, Application Security, Network Security, Cloud Computing, Cybersecurity, Information Systems Security, Security Controls, Infrastructure Security, Remote Access Systems, Public Key Infrastructure, Cryptography, Vulnerability Assessments, Virtualization, Virtual Machines, Encryption, Authorization (Computing)
Status: Free TrialJohns Hopkins University
Skills you'll gain: Electronic Medical Record, Clinical Informatics, Health Technology, Health Information Management, Clinical Documentation, Decision Support Systems, Practice Management Software, Technical Support, End User Training and Support, Patient Registration, Databases, Change Control, Interoperability, Authentications

Infosec
Skills you'll gain: Blockchain, Network Security, Application Security, Security Engineering, Infrastructure Security, Cybersecurity, Data Security, Cryptography, Cryptographic Protocols, Secure Coding, Encryption, Vulnerability Assessments, Scalability, Distributed Computing, Data Integrity, Algorithms
Status: Free TrialNew York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Cyber Security Strategy, Data Encryption Standard, Threat Management, Cyber Risk, Mobile Security, Enterprise Security, Computer Security, Threat Detection, Cyber Security Policies
Information Security learners also search
In summary, here are 10 of our most popular information security courses
- Information Theory:Â The Chinese University of Hong Kong
- Information Technology (IT) and Cloud Fundamentals:Â IBM
- Web Design: Strategy and Information Architecture:Â California Institute of the Arts
- Introduction to Information Retrieval with Amazon Q:Â Amazon Web Services
- Introduction to Information Technology and AWS Cloud:Â Amazon Web Services
- International Security Management:Â Erasmus University Rotterdam
- Hardware Security:Â University of Maryland, College Park
- Information Technology (IT) Fundamentals for Everyone:Â IBM
- Cloud Security Basics:Â University of Minnesota
- Health Information Technology Fundamentals:Â Johns Hopkins University










