Filter by
The language used throughout the course, in both instruction and assessments.
366 results for "cybersecurity"
Skills you'll gain: Artificial Neural Networks
- Status: Free
Coursera Instructor Network
University of Maryland, College Park
Skills you'll gain: Cloud Computing, Data Management
New York University
Skills you'll gain: Computer Security Models, Cryptography, Cyberattacks, Security Engineering, Security Software, Algorithms, Computational Thinking, Network Security, Security Strategy, System Security
University of California, Irvine
Skills you'll gain: Leadership and Management, Risk Management
University of Colorado System
Skills you'll gain: Cryptography, Security Engineering, Algorithms, Mathematics, Theoretical Computer Science, Critical Thinking, Mathematical Theory & Analysis, System Security, Computer Security Models, Cyberattacks, Probability Distribution, Software Security, Applied Mathematics, Computational Logic, BlockChain, Computational Thinking, Leadership and Management
Skills you'll gain: Security Strategy, Computer Security Incident Management, Python Programming, Computer Programming, Leadership and Management
New York University
Skills you'll gain: Computer Networking, Cyberattacks, Network Architecture, Network Security, Security Engineering, System Security, Security Strategy, Computer Security Incident Management, Computer Security Models, Operational Analysis
O.P. Jindal Global University
Skills you'll gain: Culture, Leadership and Management, Problem Solving, Risk Management
Coursera Project Network
Skills you'll gain: Linux
In summary, here are 10 of our most popular cybersecurity courses
- IBM Generative AI for Cybersecurity Professionals:Â IBM
- Introduction to Cybersecurity Careers:Â IBM
- Cybersecurity Best Practices:Â Coursera Instructor Network
- A Strategic Approach to Cybersecurity:Â University of Maryland, College Park
- Cybersecurity Management and Compliance:Â Microsoft
- Cyber Attack Countermeasures:Â New York University
- Introduction to Cybersecurity & Risk Management:Â University of California, Irvine
- Applied Cryptography:Â University of Colorado System
- Penetration Testing, Incident Response and Forensics:Â IBM
- Real-Time Cyber Threat Detection and Mitigation:Â New York University