Cybersecurity

Cybersecurity courses can help you learn how to protect networks, systems, and data from digital threats and security breaches.
129credentials
1online degree
422courses

Related roles

Gain the knowledge and skills you need to advance.

  • This role has a $118,656 median salary ¹.

    description:

    A Cyber Security Specialist monitors systems, responds to incidents, enforces policies, and protects data from unauthorized access and cyber threats.

    This role has a $118,656 median salary ¹.

    Offered by

    IBM_logo
    ISC2_logo
  • This role has a $115,456 median salary ¹.

    description:

    A Cyber Security Analyst monitors IT systems, analyzes threats, finds vulnerabilities, and implements measures to protect data from cyber attacks.

    This role has a $115,456 median salary ¹.

    Offered by

    Google_logo
    Microsoft_logo
    IBM_logo

Most popular

Trending now

New releases

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Find the best Cybersecurity course for your goals

  • Status: Free Trial

    Kennesaw State University

    Skills you'll gain: Cybersecurity, Cyber Security Policies, Computer Security Awareness Training, Cyber Attacks, Cyber Threat Intelligence, Personally Identifiable Information, Information Privacy, Data Ethics, Authentications, General Data Protection Regulation (GDPR), Human Factors (Security), NIST 800-53, Identity and Access Management

  • Status: Free Trial

    Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Cyber Threat Intelligence, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Risk Management, Security Awareness, Information Systems Security, Cyber Operations, Incident Response, Network Security, Risk Analysis, Asset Management

  • Status: Free Trial

    Skills you'll gain: Email Security, Personally Identifiable Information, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption

  • Status: Preview

    Kennesaw State University

    Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Business Continuity, Cryptography, Secure Coding, Systems Development Life Cycle, Security Controls, Law, Regulation, and Compliance, Infrastructure Security, Safety and Security, Identity and Access Management, Governance, Risk Management

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Risk Management, Enterprise Security, Vulnerability Assessments, Encryption, Network Security, Data Security, Security Awareness, Authentications

  • Skills you'll gain: IT Security Architecture, Threat Modeling, Enterprise Architecture, Cybersecurity, Application Security, Threat Management, Network Security, Systems Architecture, Identity and Access Management, Solution Architecture, Endpoint Security, Data Security, Risk Analysis, Remote Access Systems, Case Studies, Risk Management

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Cybersecurity, Cyber Security Strategy, Infrastructure Security, Cyber Attacks, Cyber Operations, Cyber Risk, Cyber Security Policies, Cyber Governance, Incident Response, Risk Management Framework, Technology Solutions, Legal Risk

  • Status: Preview

    Skills you'll gain: Cybersecurity, Threat Modeling, Cyber Attacks, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Risk, Cyber Security Assessment, Network Security, Risk Management, Security Controls, Data Security, Information Privacy, Vulnerability Assessments, Business Economics

  • Status: New
    Status: Free Trial

    Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Incident Response, Cyber Threat Hunting, Cybersecurity, Cyber Threat Intelligence, DevSecOps, Cloud Security, Patch Management, Cyber Security Assessment, Exploitation techniques, Network Security, Computer Security Incident Management, Business Continuity, Cryptography, Responsible AI, Threat Modeling, Information Systems Security, DevOps, Disaster Recovery

  • Status: New
    Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Data Encryption Standard, Threat Modeling, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, Vulnerability Assessments, Application Security, Security Engineering, Authentications, Data Structures, Data Integrity, Artificial Intelligence, SQL

  • Status: New
    Status: Free Trial

    Advancing Women in Tech

    Skills you'll gain: ISO/IEC 27001, Budget Management, Cybersecurity, Cyber Governance, Cyber Security Strategy, Leadership Development, Cyber Risk, Security Management, Information Systems Security, Business Strategies, Strategic Leadership, Leadership and Management, Risk Management, Business Metrics, Vendor Management, Team Leadership, Compliance Auditing, Business Communication, Information Technology, Artificial Intelligence and Machine Learning (AI/ML)

  • Status: New
    Status: Free Trial

    Skills you'll gain: Incident Response, Vulnerability Management, Computer Security Incident Management, Cyber Operations, Hardening, Cybersecurity, Security Controls, Vulnerability Assessments, Threat Detection, Identity and Access Management, Intrusion Detection and Prevention, IT Security Architecture, Information Systems Security, Vulnerability Scanning, Threat Management, Application Security, Mobile Security, Network Security, Authorization (Computing), Continuous Monitoring

What brings you to Coursera today?

Leading partners

  • Packt
  • Infosec
  • Pearson
  • LearnQuest
  • IBM
  • Google Cloud
  • Kennesaw State University
  • Google