Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Information Security Course Catalog
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Data Ethics, Security Awareness, Computer Security Awareness Training, Ethical Standards And Conduct, Cybersecurity, Information Technology, Information Privacy, Media and Communications, Machine Learning, Personally Identifiable Information, Artificial Intelligence, General Data Protection Regulation (GDPR), Data Collection
- Status: Free Trial
Rice University
Skills you'll gain: Scientific Methods, Anthropology, Social Sciences, Environmental Science, Research, Laboratory Research, Ancient History, General Science and Research, Investigation, Culture, Geographic Information Systems, Environment, Spatial Analysis, Data Collection, Geospatial Information and Technology
Wesleyan University
Skills you'll gain: Community Organizing, Advocacy, Lobbying, Public Policies, Policy Development, Policy Analysis, Political Sciences, Social Justice, Court Systems, Lawsuits, Persuasive Communication, Social Media, Media and Communications, Legal Strategy, Environmental Issue
Skills you'll gain: Kubernetes, Microservices, Docker (Software), Containerization, Application Deployment, Google Cloud Platform, Software Architecture, Systems Architecture, Cloud Applications
- Status: Free Trial
Vanderbilt University
Skills you'll gain: Statistical Methods, Data Presentation, Regression Analysis, Statistical Analysis, Technical Communication, Probability & Statistics, Scatter Plots, Data Analysis, Predictive Analytics, Generative AI, Forecasting
- Status: Free Trial
Skills you'll gain: Threat Modeling, IT Security Architecture, Threat Management, Network Security, Internet Of Things, Threat Detection, Cloud Security, Security Engineering, Infrastructure Security, Vulnerability Management, Identity and Access Management, Information Systems Security, Encryption, Incident Response, Cybersecurity, Security Controls, Penetration Testing, Vulnerability Assessments, Cloud Solutions, Data Security
- Status: Free Trial
Imperial College London
Skills you'll gain: Run Chart, Qualitative Research, Continuous Quality Improvement (CQI), Quantitative Research, Descriptive Statistics, Data Collection, Data-Driven Decision-Making, Statistical Methods, Data Analysis, Data Presentation, Systems Of Measurement, Time Series Analysis and Forecasting
- Status: Free Trial
University of Maryland, College Park
Skills you'll gain: Persuasive Communication, Influencing, Communication, Virtual Teams, Leadership, Project Management Institute (PMI) Methodology, Stakeholder Communications, Project Management, Program Management, Emotional Intelligence, Strategic Communication, Non-Verbal Communication, Presentations, Team Building
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Threat Modeling, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Application Security, Network Security, Vulnerability Management, Virtual Local Area Network (VLAN), Malware Protection, Cloud Security, Wireless Networks, Network Protocols, Application Programming Interface (API)
Coursera Project Network
Skills you'll gain: Collaborative Software, Document Management, Project Management Software, Telecommuting, Project Management, Productivity Software, Internal Communications, Data Security, User Accounts, Information Privacy, Account Management, Automation
Skills you'll gain: Google Cloud Platform, Cloud Applications, Ruby on Rails, Application Deployment, PostgreSQL, CI/CD, Object-Relational Mapping, Cloud Storage, Database Application, Secure Coding, Relational Databases, Data Management
Skills you'll gain: Unix Shell, Unix Commands, z/OS, Unix, File Systems, Job Control Language (JCL), Operating Systems, Command-Line Interface, OS Process Management, File Management, Mainframe Computing, Debugging
Information Security learners also search
In summary, here are 10 of our most popular information security courses
- Computing, Ethics, and Society Foundations:Â University of Colorado Boulder
- Introduction to Archaeology : Archaeology as Science:Â Rice University
- Take Action: From Protest to Policy:Â Wesleyan University
- Migrating a Monolithic Website to Microservices on Google Kubernetes Engine:Â Google Cloud
- From Data to Decisions: Making Predictions with AI:Â Vanderbilt University
- Assessing and Managing Secure IoT Applications and Devices:Â LearnQuest
- Using Data for Healthcare Improvement:Â Imperial College London
- Persuasion and Presence for Program and Project Managers:Â University of Maryland, College Park
- Advanced Penetration Techniques:Â Packt
- Use Basecamp for Project Management:Â Coursera Project Network