Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Find the Best Cybersecurity Course for Your Goals
EIT Digital
Skills you'll gain: Cybersecurity, Threat Modeling, Cyber Attacks, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Risk, Cyber Security Assessment, Network Security, Risk Management, Security Controls, Data Security, Information Privacy, Vulnerability Assessments, Business Economics
Skills you'll gain: Azure Active Directory, Authentications, Identity and Access Management, Authorization (Computing), Active Directory, Role-Based Access Control (RBAC), Multi-Factor Authentication, Microsoft Azure, Single Sign-On (SSO), Software As A Service, User Accounts, Cloud Services
Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, Threat Management, System Testing, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface
University of Maryland, College Park
Skills you'll gain: Application Security, Secure Coding, Vulnerability Assessments, Security Software, Security Testing, Cybersecurity, Collaborative Software, Threat Modeling, Debugging, Systems Design, Version Control
Skills you'll gain: Cloud Security, Cyber Security Policies, Security Management, Data Management, Records Management, Cloud Computing Architecture, Data Security, General Data Protection Regulation (GDPR), Cloud Computing, Data Governance, Personally Identifiable Information, Information Privacy, Threat Detection, Microsoft Azure, Security Controls
- Status: Free
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Code Review, Vulnerability Scanning, Vulnerability Assessments
University at Buffalo
Skills you'll gain: Model Based Systems Engineering, Systems Engineering, Product Lifecycle Management, Intrusion Detection and Prevention, Security Controls, Performance Measurement, Control Systems, Continuous Monitoring, Anomaly Detection, Machine Controls, Incident Response, Digital Transformation, Vulnerability Assessments, Process Analysis, Data Sharing, Manufacturing Processes, Manufacturing Operations, Product Design, Manufacturing and Production, Constructive Feedback
University of London
Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Skills you'll gain: Digital Transformation, Cloud Computing Architecture, Stakeholder Engagement, Consulting, Systems Design, Relationship Management, Business Consulting, Cloud Computing, Technical Design, Solution Design, User Feedback, Product Strategy, Technical Consulting, Customer Engagement, Cybersecurity, System Implementation, Professional Networking, Project Management, SAP Applications, Test Planning
University of Colorado Boulder
Skills you'll gain: Data Security, Cybersecurity, Cyber Attacks, Data Ethics, Authentications, Information Assurance, Authorization (Computing), Cryptography, Human Factors (Security), Security Controls, Information Privacy, Computer Security Incident Management, Technical Communication
In summary, here are 10 of our most popular cybersecurity courses
- Becoming a Cybersecurity Consultant:Â EIT Digital
- Cybersecurity Identity and Access Solutions using Azure AD:Â Microsoft
- Cybersecurity Testing and Prevention:Â Microsoft
- Cybersecurity Capstone Project:Â University of Maryland, College Park
- Cybersecurity Planning, Management, and Compliance:Â Microsoft
- Cryptography I:Â Stanford University
- Security Analyst Fundamentals:Â IBM
- Digital Manufacturing & Design Technology:Â University at Buffalo
- Cyber Security Fundamentals:Â University of London
- Sound the Alarm: Detection and Response:Â Google