Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Information Security Course Catalog
Coursera Project Network
Skills you'll gain: Spreadsheet Software, Google Sheets, Data Visualization, Data Entry, Data Analysis, Data Validation
- Status: Free Trial
Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Cyber Attacks, Vulnerability Management, Incident Response, Network Architecture
- Status: Free Trial
Queen Mary University of London
Skills you'll gain: Qualitative Research, Proposal Development, Market Research, Research Reports, Data Collection, Research Design, Research Methodologies, Data Analysis, Statistical Hypothesis Testing, Survey Creation, Statistical Analysis, Surveys, Correlation Analysis, Quantitative Research, Research, Science and Research, Market Analysis, Focus Group, Regression Analysis, Content Performance Analysis
- Status: Free Trial
Google Cloud
Skills you'll gain: Gmail, Google Workspace, Email Security, Productivity Software, Business Writing, Organizational Skills, Business Communication, Data Import/Export
University of Pennsylvania
Skills you'll gain: Legal Proceedings, Civil Procedures, Court Systems, Social Studies, Civil Law, Political Sciences, Case Law, Public Safety and National Security, Legal Research, Social Justice, Governance, Health Policy, Diversity Equity and Inclusion Initiatives
- Status: Free Trial
University of Alberta
Skills you'll gain: Requirements Analysis, Requirements Elicitation, Requirements Management, Functional Requirement, Business Requirements, Product Requirements, Backlogs, User Requirements Documents, Scope Management, Change Control, User Story, System Requirements, Client Services, Acceptance Testing, Agile Software Development, Prioritization
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Information and Event Management (SIEM), Security Controls, Document Management, Data Integrity, Technical Communication, Technical Documentation
- Status: Free Trial
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cyber Threat Intelligence, Cybersecurity, Threat Detection, Vulnerability Assessments, Security Awareness, Threat Management, Malware Protection, Vulnerability Management, Network Security, Artificial Intelligence
University of Pittsburgh
Skills you'll gain: Triage, Mitigation, Emergency Response, Safety and Security, Emergency Medicine, First Aid, Healthcare Ethics, Risk Analysis, Stress Management, Resourcefulness, Adaptability, Water Resources, Cultural Diversity, Activities of Daily Living (ADLs)
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Risk Management Framework, Continuous Monitoring, Cyber Security Assessment, Security Controls, Information Privacy
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Rmarkdown, Knitr, Data Sharing, Statistical Reporting, Data Analysis, Statistical Analysis, Data Validation, R Programming, Verification And Validation, Technical Documentation
- Status: Free Trial
Skills you'll gain: Data Cleansing, Rmarkdown, Data Storytelling, Data Presentation, Data Validation, Spreadsheet Software, Data Visualization, Data Ethics, Data Literacy, Tableau Software, Data Visualization Software, Data Analysis, Ggplot2, Analytical Skills, Stakeholder Communications, Presentations, SQL, Data Quality, Data Collection, Data Processing
Information Security learners also search
In summary, here are 10 of our most popular information security courses
- Spreadsheets for Beginners using Google Sheets: Coursera Project Network
- Cybersecurity Assessment: CompTIA Security+ & CYSA+: IBM
- Market Research: Queen Mary University of London
- Gmail: Google Cloud
- Introduction to Key Constitutional Concepts and Supreme Court Cases: University of Pennsylvania
- Client Needs and Software Requirements : University of Alberta
- Incident Response and Digital Forensics: IBM
- Cybersecurity Case Studies and Capstone Project: IBM
- Disaster Preparedness: University of Pittsburgh
- The GRC Approach to Managing Cybersecurity: Kennesaw State University