• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Information Security

Information Security Courses

Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.


Popular Information Security Courses and Certifications


  • Status: New
    New
    Status: Free Trial
    Free Trial
    J

    John Wiley & Sons

    Cybersecurity Technology and Response Strategies

    Skills you'll gain: Incident Response, Computer Security Incident Management, Security Controls, Incident Management, Business Continuity Planning, Security Management, Business Continuity, Disaster Recovery, Security Strategy, Cyber Security Strategy, Cybersecurity, Threat Management, Contingency Planning, Risk Management, Information Systems Security, Operational Risk, Risk Management Framework, Risk Analysis, Cyber Risk, Security Awareness

    Intermediate · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    E

    Erasmus University Rotterdam

    Cybersecurity in Healthcare (Hospitals & Care Centres)

    Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Threat Management, Patient Safety, Malware Protection, Security Controls, Encryption, Health Technology, Data Security, Information Privacy

    4.6
    Rating, 4.6 out of 5 stars
    ·
    400 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    E

    EC-Council

    Network Defense Essentials (NDE)

    Skills you'll gain: Network Security, Mobile Security, Public Key Infrastructure, Cryptography, Security Controls, Cryptographic Protocols, Cybersecurity, Authorization (Computing), Encryption, Authentications, Identity and Access Management, Wireless Networks, Cloud Computing, Cloud Security, Virtual Machines, Network Monitoring, Data Security, Internet Of Things, Virtualization and Virtual Machines

    4.6
    Rating, 4.6 out of 5 stars
    ·
    125 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Introduction to Cybersecurity Careers

    Skills you'll gain: Cybersecurity, Information Technology, Cyber Security Strategy, Penetration Testing, Cyber Security Policies, Technical Support and Services, Incident Response, Computer Security Awareness Training, Security Awareness, Vulnerability Assessments, Network Security, Data Security, Information Assurance, Cloud Security, Operating Systems, Computer Hardware

    4.7
    Rating, 4.7 out of 5 stars
    ·
    1.1K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Cybersecurity Management and Compliance

    Skills you'll gain: Record Keeping, Regulatory Requirements, Cloud Security, Regulatory Compliance, Data Management, Regulation and Legal Compliance, Data Maintenance, Cloud Computing Architecture, Records Management, Compliance Management, IT Security Architecture, Cloud Management, Cloud Standards, Security Management, Cloud Computing, Cyber Security Policies, Microsoft Azure, Compliance Reporting, Data Security, Threat Management

    4.8
    Rating, 4.8 out of 5 stars
    ·
    149 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    P

    Packt

    Mastering ISO 27001 Controls: Implementation and Auditing

    Skills you'll gain: ISO/IEC 27001, Auditing, Audit Planning, Security Controls, Cyber Security Policies, Security Management, Information Systems Security, Risk Management, Risk Management Framework, Identity and Access Management, Information Technology

    3.8
    Rating, 3.8 out of 5 stars
    ·
    6 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    IBM Ethical Hacking with Open Source Tools

    Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Network Analysis

    4.6
    Rating, 4.6 out of 5 stars
    ·
    194 reviews

    Intermediate · Professional Certificate · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    I

    ISC2

    Access Control Concepts

    Skills you'll gain: Cybersecurity, Security Controls, Role-Based Access Control (RBAC), Authorization (Computing), Data Security, Cyber Security Policies, Identity and Access Management, Information Systems Security, Data Access, User Provisioning, Authentications, Multi-Factor Authentication

    4.8
    Rating, 4.8 out of 5 stars
    ·
    170 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH)

    Skills you'll gain: Open Web Application Security Project (OWASP), AI Security, Vulnerability Assessments, Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

    4.6
    Rating, 4.6 out of 5 stars
    ·
    23 reviews

    Intermediate · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Pearson

    The Pearson Complete Course for CISM Certification

    Skills you'll gain: Incident Response, Threat Modeling, Security Management, Risk Management, Business Continuity Planning, Disaster Recovery, Governance, Business Continuity, Application Security, Information Management, Security Controls, Continuous Monitoring, Configuration Management, Regulatory Compliance, Governance Risk Management and Compliance, Risk Mitigation, Law, Regulation, and Compliance, Cybersecurity, Cloud Computing, Malware Protection

    4.5
    Rating, 4.5 out of 5 stars
    ·
    11 reviews

    Intermediate · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    NIST DoD RMF

    Skills you'll gain: Risk Management Framework, Federal Information Security Management Act, Systems Development Life Cycle, Cyber Risk, Security Management, Continuous Monitoring, Cyber Security Policies, Security Controls, Authorization (Computing), Information Privacy, Cyber Security Assessment, Information Systems

    4.6
    Rating, 4.6 out of 5 stars
    ·
    54 reviews

    Mixed · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH): Unit 1

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Cybersecurity, Cyber Security Strategy, Exploitation techniques, Cyber Attacks, Cyber Security Policies

    4.6
    Rating, 4.6 out of 5 stars
    ·
    14 reviews

    Intermediate · Course · 1 - 4 Weeks

1…111213…777

In summary, here are 10 of our most popular information security courses

  • Cybersecurity Technology and Response Strategies: John Wiley & Sons
  • Cybersecurity in Healthcare (Hospitals & Care Centres): Erasmus University Rotterdam
  • Network Defense Essentials (NDE): EC-Council
  • Introduction to Cybersecurity Careers: IBM
  • Cybersecurity Management and Compliance: Microsoft
  • Mastering ISO 27001 Controls: Implementation and Auditing: Packt
  • IBM Ethical Hacking with Open Source Tools: IBM
  • Access Control Concepts: ISC2
  • Certified Ethical Hacker (CEH): Pearson
  • The Pearson Complete Course for CISM Certification: Pearson

Skills you can learn in Computer Security And Networks

Cybersecurity (33)
Google (25)
Google Cloud Platform (17)
Internet (17)
Cryptography (16)
Network Security (16)
Linux (12)
Software Testing (12)
Information Security (10)
Application Programming Interfaces (8)
Kubernetes (8)
Web (8)

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications
  • Share your Coursera learning story

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Udemy

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok