• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Computer Ethik


Results for "computer-ethik"


  • I

    IBM

    IBM Ethical Hacking with Open Source Tools

    Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Intrusion Detection and Prevention, Network Troubleshooting, Anomaly Detection, Information Systems Security, Cyber Security Policies, Network Analysis

    4.6
    Rating, 4.6 out of 5 stars
    ·
    180 reviews

    Intermediate · Professional Certificate · 3 - 6 Months

  • I

    Infosec

    Computer Forensics

    Skills you'll gain: Digital Forensics, File Systems, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, File Management, Operating Systems, Data Structures, General Networking, Data Validation, Record Keeping, Data Integrity, Data Storage, Data Analysis Software, User Accounts, USB, Ethical Standards And Conduct, Encryption

    4.7
    Rating, 4.7 out of 5 stars
    ·
    345 reviews

    Intermediate · Specialization · 3 - 6 Months

  • P

    Pearson

    Certified Ethical Hacker (CEH)

    Skills you'll gain: Open Web Application Security Project (OWASP), AI Security, Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Encryption, Cloud Security, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

    4.6
    Rating, 4.6 out of 5 stars
    ·
    20 reviews

    Intermediate · Specialization · 1 - 3 Months

  • M

    Microsoft

    Introduction to Computers

    Skills you'll gain: Business Software, Computer Hardware, Generative AI, Operating Systems, Data Storage Technologies, Computer Systems, Enterprise Security, System Software, Information Technology, Hardware Troubleshooting, Computer Architecture, Technology Solutions, System Configuration, Technical Support and Services, Servers, Cybersecurity

    4.8
    Rating, 4.8 out of 5 stars
    ·
    1.1K reviews

    Beginner · Course · 1 - 4 Weeks

  • P

    Packt

    Certified Ethical Hacker (CEH) v.12

    Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Microsoft Intune (Mobile Device Management Software), Network Security, Cryptography, Threat Management, Threat Detection, Cloud Security

    4.8
    Rating, 4.8 out of 5 stars
    ·
    30 reviews

    Beginner · Specialization · 3 - 6 Months

  • G

    Google Cloud

    KI-Infrastruktur: Cloud-GPUs

    Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, System Requirements, Hardware Architecture, Technology Solutions, Infrastructure Architecture, Computer Architecture, Performance Tuning

    Intermediate · Course · 1 - 4 Weeks

What brings you to Coursera today?

  • P

    Princeton University

    Computer Science: Programming with a Purpose

    Skills you'll gain: Programming Principles, Computer Programming, Object Oriented Programming (OOP), Performance Tuning, Data Structures, Java Programming, Java, Program Development, File I/O, Computational Thinking, Computer Science, Algorithms, Animations, Debugging

    4.7
    Rating, 4.7 out of 5 stars
    ·
    1.3K reviews

    Beginner · Course · 1 - 3 Months

  • D

    Dartmouth College

    C Programming with Linux

    Skills you'll gain: Command-Line Interface, C (Programming Language), Linux Commands, Linux, Embedded Systems, File I/O, Embedded Software, Software Visualization, Programming Principles, Computer Engineering, Linux Servers, File Systems, System Programming, Algorithms, Computer Architecture, Computer Programming, Software Documentation, Computer Science, Software Engineering, Debugging

    4.6
    Rating, 4.6 out of 5 stars
    ·
    438 reviews

    Beginner · Specialization · 3 - 6 Months

  • P

    Princeton University

    Computer Science: Algorithms, Theory, and Machines

    Skills you'll gain: Theoretical Computer Science, Data Structures, Computer Science, Computer Architecture, Algorithms, Programming Principles, Computational Logic, Java Programming, Computer Hardware, Scalability

    4.7
    Rating, 4.7 out of 5 stars
    ·
    754 reviews

    Intermediate · Course · 1 - 3 Months

  • C

    Coursera

    SystemVerilog Tutorials: Hardware Design & Verification

    Skills you'll gain: Hardware Design, Field-Programmable Gate Array (FPGA), Data Structures, Systems Design, Application Specific Integrated Circuits, Electronic Systems, Computer Engineering, Verification And Validation, Embedded Systems, Software Design, Simulation and Simulation Software, Test Engineering, Programming Principles, Data Synthesis, Analysis, Design, Process Optimization

    Intermediate · Course · 1 - 4 Weeks

  • C

    Coursera

    Digital Literacy: Introduction to Using Computers

    Skills you'll gain: File Management, Computer Literacy, Microsoft Office, Email Security, Computer Hardware, Computer Security Awareness Training, Spreadsheet Software, digital literacy, Information Management, Safety and Security

    4.8
    Rating, 4.8 out of 5 stars
    ·
    16 reviews

    Intermediate · Course · 1 - 4 Weeks

  • G

    Google

    The Bits and Bytes of Computer Networking

    Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, Network Architecture, Network Protocols, OSI Models, Network Routing, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks, Network Model, Data Integrity

    4.7
    Rating, 4.7 out of 5 stars
    ·
    52K reviews

    Beginner · Course · 1 - 3 Months

1234…664

In summary, here are 10 of our most popular computer-ethik courses

  • IBM Ethical Hacking with Open Source Tools: IBM
  • Computer Forensics: Infosec
  • Certified Ethical Hacker (CEH): Pearson
  • Introduction to Computers: Microsoft
  • Certified Ethical Hacker (CEH) v.12: Packt
  • KI-Infrastruktur: Cloud-GPUs: Google Cloud
  • Computer Science: Programming with a Purpose: Princeton University
  • C Programming with Linux: Dartmouth College
  • Computer Science: Algorithms, Theory, and Machines: Princeton University
  • SystemVerilog Tutorials: Hardware Design & Verification: Coursera

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok