• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Computer Security

Results for "computer security"


  • I

    Illinois Tech

    Cloud Computing Security - Bachelor's

    Skills you'll gain: Cloud Security, AWS Identity and Access Management (IAM), Identity and Access Management, Incident Response, Computer Security Incident Management, Cloud Computing, Network Security, Data Security, Cloud Platforms, Cloud Computing Architecture, Application Security, Cloud Services, Encryption, Firewall, Virtual Networking, Security Controls, Continuous Monitoring

    Build toward a degree

    Beginner · Course · 1 - 3 Months

  • C

    Campus BBVA

    Cybersecurity for Tech Professionals

    Skills you'll gain: Incident Response, Computer Security Incident Management, Cybersecurity, Cyber Attacks, Security Information and Event Management (SIEM), Data Security, Fraud detection, Application Security, Computer Security Awareness Training, Security Awareness, Information Technology Operations, Threat Detection, Mobile Security, Identity and Access Management, Authentications

    4.7
    Rating, 4.7 out of 5 stars
    ·
    192 reviews

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Information Technology and Security Principles

    4.9
    Rating, 4.9 out of 5 stars
    ·
    19 reviews

    Intermediate · Course · 1 - 4 Weeks

  • B

    Ball State University

    Cybersecurity and Secure Software Design

    Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity

    Build toward a degree

    5
    Rating, 5 out of 5 stars
    ·
    6 reviews

    Intermediate · Course · 1 - 3 Months

  • U

    University of California, Davis

    Identifying Security Vulnerabilities

    Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information

    4.7
    Rating, 4.7 out of 5 stars
    ·
    178 reviews

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Beginning Security

    Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Data Security, Cybersecurity, Cyber Attacks, Web Applications, Threat Detection, Security Awareness, Vulnerability Management, Encryption, Authentications, Authorization (Computing), PHP (Scripting Language)

    Beginner · Course · 1 - 3 Months

  • K

    Kennesaw State University

    Cybersecurity: Protecting your Information on the Go

    Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Security Awareness, Information Privacy, Emerging Technologies

    4.9
    Rating, 4.9 out of 5 stars
    ·
    9 reviews

    Beginner · Course · 1 - 3 Months

  • U

    University of London

    How Computers Work

    Skills you'll gain: Computer Science, Computer Systems, Web Applications, Computer Literacy, Network Security, Computer Networking, Computational Thinking, Debugging, Web Design and Development, Cybersecurity, Problem Management, Software Architecture, Data Storage

    4.6
    Rating, 4.6 out of 5 stars
    ·
    580 reviews

    Beginner · Course · 1 - 4 Weeks

  • K

    Kennesaw State University

    Cybersecurity Awareness For Everyone: Final Assessment

    Skills you'll gain: Computer Security Awareness Training, Security Awareness, Cybersecurity, Infrastructure Security, Network Security, Internet Of Things, Network Infrastructure

    5
    Rating, 5 out of 5 stars
    ·
    8 reviews

    Beginner · Course · 1 - 4 Weeks

  • U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking Unix and Windows

    Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Vulnerability Assessments, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Linux Commands, Computer Architecture, Authentications

    Build toward a degree

    Intermediate · Course · 1 - 3 Months

  • C

    Codio

    Linux for Security Experts

    Skills you'll gain: Vulnerability Scanning, Digital Forensics, Linux, Linux Administration, Network Security, User Accounts, Network Monitoring, System Monitoring, Hardening, Continuous Monitoring, Information Systems Security, Security Controls, Wireless Networks, Penetration Testing, Cybersecurity, Containerization, Incident Response

    5
    Rating, 5 out of 5 stars
    ·
    7 reviews

    Beginner · Course · 1 - 4 Weeks

  • I

    Illinois Tech

    Hardware and Operating System Foundations III

    Skills you'll gain: Operating System Administration, Microsoft Windows, Operating Systems, System Configuration, Firewall, Linux Administration, Linux, Linux Servers, System Monitoring, File Systems, System Support, File Management, Windows Servers, Data Security

    Build toward a degree

    4.8
    Rating, 4.8 out of 5 stars
    ·
    26 reviews

    Intermediate · Course · 1 - 4 Weeks

Searches related to computer security

computer security incident management
computer security awareness training
computer security and systems management
computer security and systems management specialization
computer security and cryptography
computer security and networks
computer networks and network security
introduction to computer security
1…678…772

In summary, here are 10 of our most popular computer security courses

  • Cloud Computing Security - Bachelor's: Illinois Tech
  • Cybersecurity for Tech Professionals: Campus BBVA
  • Information Technology and Security Principles: Packt
  • Cybersecurity and Secure Software Design: Ball State University
  • Identifying Security Vulnerabilities: University of California, Davis
  • Beginning Security: Packt
  • Cybersecurity: Protecting your Information on the Go: Kennesaw State University
  • How Computers Work: University of London
  • Cybersecurity Awareness For Everyone: Final Assessment: Kennesaw State University
  • Security & Ethical Hacking: Attacking Unix and Windows : University of Colorado Boulder

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok