• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cyber Security

Results for "cyber security"


  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Mastering Endpoint Security & Threat Defense

    Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Anomaly Detection, System Monitoring, Identity and Access Management, Virtual Machines

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Healthcare Data Security, Privacy, and Compliance

    Skills you'll gain: Medical Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management, Security Awareness, Personally Identifiable Information, Encryption, Health Care, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Medical Records, Information Privacy, Cloud Computing, Patient Safety

    4.8
    Rating, 4.8 out of 5 stars
    ·
    454 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Information Technology and Security Principles

    4.9
    Rating, 4.9 out of 5 stars
    ·
    18 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    E

    EC-Council

    In the Trenches: Security Operations Center

    Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection

    4.7
    Rating, 4.7 out of 5 stars
    ·
    54 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    S

    SkillUp

    Cutting-Edge Blockchain Security Mechanisms

    Skills you'll gain: Blockchain, Cryptography, Encryption, Application Security, Threat Modeling, Cybersecurity, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Security Best Practices in Google Cloud

    Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Data Storage Technologies, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Encryption, Key Management, Virtual Machines

    4.7
    Rating, 4.7 out of 5 stars
    ·
    351 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Strategies for Cloud Security Risk Management

    Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, Security Management, ISO/IEC 27001, Information Privacy, NIST 800-53, Infrastructure as Code (IaC), Cyber Security Policies, Security Controls, Google Cloud Platform, Cybersecurity

    4.6
    Rating, 4.6 out of 5 stars
    ·
    74 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    W

    Whizlabs

    AWS: Security, Governance, and Compliance

    Skills you'll gain: AWS CloudFormation, Amazon CloudWatch, Cloud Security, Data Security, Infrastructure as Code (IaC), Data Governance, AWS Identity and Access Management (IAM), Cyber Governance, Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Key Management, Security Controls, Amazon S3, Continuous Monitoring, Firewall, System Monitoring

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    L

    LearnQuest

    Managing IoT Security in Networks

    Skills you'll gain: Threat Modeling, IT Security Architecture, Network Security, Internet Of Things, Identity and Access Management, Encryption, Security Engineering, Information Systems Security, Cybersecurity, Security Controls, Threat Management, Cloud Security, Vulnerability Assessments, Threat Detection, Cloud Solutions, Systems Architecture, Cryptography

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Certified Information Systems Security Professional (CISSP)

    Skills you'll gain: Identity and Access Management, IT Security Architecture, Security Testing, Single Sign-On (SSO), Data Security, Contingency Planning, User Provisioning, Cryptography, Network Security, Application Security, Information Systems Security, Cryptographic Protocols, Asset Protection, Cloud Security, Computer Security Incident Management, Digital Assets, Public Key Cryptography Standards (PKCS), Incident Response, Risk Management Framework, Risk Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    72 reviews

    Advanced · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    P

    Palo Alto Networks

    Palo Alto Networks Security Operations Fundamentals

    Skills you'll gain: Cyber Operations, Cyber Threat Intelligence, Endpoint Security, Endpoint Detection and Response, Security Information and Event Management (SIEM), Continuous Monitoring, Threat Detection, Threat Management, Security Controls, Incident Response, Automation, Artificial Intelligence and Machine Learning (AI/ML)

    4.7
    Rating, 4.7 out of 5 stars
    ·
    225 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    A

    AI CERTs

    Securing the Assets: Bitcoin Security

    Skills you'll gain: Blockchain, Threat Modeling, Cryptography, Cryptographic Protocols, Threat Management, Security Engineering, Network Security, Cyber Threat Intelligence, Data Security, Threat Detection, Vulnerability Assessments, Information Systems Security, Cyber Security Strategy, Encryption, Key Management, Network Protocols, Scripting, Regulatory Compliance, Financial Regulation, Scalability

    Intermediate · Specialization · 1 - 3 Months

Searches related to cyber security

cyber security fundamentals
cyber security technologies
cyber security: digital forensics
cyber security essentials
cyber security management and leadership
cyber security – technology and governance
cyber security strategy
cyber security: grc part 1 - governance
1…282930…259

In summary, here are 10 of our most popular cyber security courses

  • Mastering Endpoint Security & Threat Defense : Starweaver
  • Healthcare Data Security, Privacy, and Compliance: Johns Hopkins University
  • Information Technology and Security Principles: Packt
  • In the Trenches: Security Operations Center : EC-Council
  • Cutting-Edge Blockchain Security Mechanisms: SkillUp
  • Security Best Practices in Google Cloud: Google Cloud
  • Strategies for Cloud Security Risk Management: Google Cloud
  • AWS: Security, Governance, and Compliance: Whizlabs
  • Managing IoT Security in Networks: LearnQuest
  • Certified Information Systems Security Professional (CISSP): Infosec

Skills you can learn in Computer Security And Networks

Cybersecurity (33)
Google (25)
Google Cloud Platform (17)
Internet (17)
Cryptography (16)
Network Security (16)
Linux (12)
Software Testing (12)
Information Security (10)
Application Programming Interfaces (8)
Kubernetes (8)
Web (8)

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok