Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Information Security Course Catalog
Status: NewStatus: Free TrialAI CERTs
Skills you'll gain: Threat Modeling, Secure Coding, Application Security, Blockchain, Scripting, Vulnerability Assessments, Scalability, Application Design, Payment Systems, Transaction Processing, Cryptography, FinTech, Emerging Technologies
Status: NewSkills you'll gain: Linux Servers, System Configuration, User Accounts
Status: NewStatus: Free TrialSkills you'll gain: Security Controls, Continuous Monitoring, Authorization (Computing), Anomaly Detection
Status: Free TrialUniversity of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Security Controls, Authentications, Security Testing, Vulnerability Management, Personally Identifiable Information

Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Encryption
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Security Awareness, Cyber Attacks, Cyber Risk, Mobile Security, Cybersecurity, Cyber Security Strategy, Cyber Governance, Malware Protection, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Data Security, Cyber Threat Hunting, Human Factors (Security), Email Security, Identity and Access Management, Security Management, Security Strategy, Multi-Factor Authentication, Cloud Security
Status: Free TrialSkills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Enterprise Risk Management (ERM), Business Risk Management, Security Strategy
Status: Free TrialMicrosoft
Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Microsoft Copilot, Data Security, Back-End Web Development, Authorization (Computing), Application Security, JSON, Identity and Access Management, Data Storage, .NET Framework, Application Programming Interface (API), Encryption

Skills you'll gain: OSI Models, Network Security, Security Controls, General Networking, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Telecommunications, Proxy Servers, Network Infrastructure, Intrusion Detection and Prevention, Remote Access Systems
Status: Free TrialMicrosoft
Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), Authentications, Authorization (Computing), Microsoft Copilot, Application Security, Data Validation, Web Applications, Security Controls, Web Development, Vulnerability Assessments, Data Security, Encryption
Status: Free TrialInfosec
Skills you'll gain: Application Security, Secure Coding, Security Testing, Security Software, Vulnerability Scanning, Security Controls, Security Awareness, Web Development Tools, Web Applications, Browser Compatibility, Computer Programming

Skills you'll gain: Software Testing, Open Web Application Security Project (OWASP), Business Logic, Development Testing, Secure Coding, Cryptography, Cybersecurity, Test Case, Identity and Access Management, Authentications, Vulnerability Assessments, Data Validation, Network Protocols, Authorization (Computing), Web Applications
Information Security learners also search
In summary, here are 10 of our most popular information security courses
- Bitcoin Scaling & Security:Â AI CERTs
- Linux Security Techniques:Â Packt
- Microsoft Security Solutions Capabilities:Â Whizlabs
- Identifying Security Vulnerabilities:Â University of California, Davis
- Systems and Application Security:Â ISC2
- Cyber Security: Essentials:Â Macquarie University
- Tools for Security Specialists:Â Codio
- Security and Authentication:Â Microsoft
- Network and Communications Security :Â ISC2
- Web Application Security:Â Microsoft










