• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Computer Security

Results for "computer security"


  • P

    Packt

    Beginning Security

    Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Data Security, Cybersecurity, Cyber Attacks, Web Applications, Threat Detection, Security Awareness, Vulnerability Management, Encryption, Authentications, Authorization (Computing), PHP (Scripting Language)

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    Information Technology and Security Principles

    4.9
    Rating, 4.9 out of 5 stars
    ·
    19 reviews

    Intermediate · Course · 1 - 4 Weeks

  • B

    Ball State University

    Cybersecurity and Secure Software Design

    Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity

    Build toward a degree

    5
    Rating, 5 out of 5 stars
    ·
    6 reviews

    Intermediate · Course · 1 - 3 Months

  • U

    University of California, Davis

    Identifying Security Vulnerabilities

    Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information

    4.7
    Rating, 4.7 out of 5 stars
    ·
    178 reviews

    Intermediate · Course · 1 - 4 Weeks

  • K

    Kennesaw State University

    Cybersecurity: Protecting your Information on the Go

    Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Security Awareness, Information Privacy, Emerging Technologies

    4.9
    Rating, 4.9 out of 5 stars
    ·
    9 reviews

    Beginner · Course · 1 - 3 Months

  • U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking Unix and Windows

    Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Vulnerability Assessments, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Linux Commands, Computer Architecture, Authentications

    Build toward a degree

    Intermediate · Course · 1 - 3 Months

  • K

    Kennesaw State University

    Cybersecurity Awareness For Everyone: Final Assessment

    Skills you'll gain: Computer Security Awareness Training, Security Awareness, Cybersecurity, Infrastructure Security, Network Security, Internet Of Things, Network Infrastructure

    5
    Rating, 5 out of 5 stars
    ·
    8 reviews

    Beginner · Course · 1 - 4 Weeks

  • U

    University of London

    How Computers Work

    Skills you'll gain: Computer Science, Computer Systems, Web Applications, Computer Literacy, Network Security, Computer Networking, Computational Thinking, Debugging, Web Design and Development, Cybersecurity, Problem Management, Software Architecture, Data Storage

    4.6
    Rating, 4.6 out of 5 stars
    ·
    580 reviews

    Beginner · Course · 1 - 4 Weeks

  • N

    New York University

    Enterprise and Infrastructure Security

    Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Awareness, Cloud Computing Architecture, Blockchain, Internet Of Things, Cryptography, Data Integrity

    4.7
    Rating, 4.7 out of 5 stars
    ·
    682 reviews

    Intermediate · Course · 1 - 4 Weeks

  • E

    Edureka

    Cyber Threats and Network Security Foundations

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Threat Modeling, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, Cyber Attacks, Hardening, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management

    Beginner · Course · 1 - 4 Weeks

  • I

    Illinois Tech

    Hardware and Operating System Foundations III

    Skills you'll gain: Operating System Administration, Microsoft Windows, Operating Systems, System Configuration, Firewall, Linux Administration, Linux, Linux Servers, System Monitoring, File Systems, System Support, File Management, Windows Servers, Data Security

    Build toward a degree

    4.8
    Rating, 4.8 out of 5 stars
    ·
    26 reviews

    Intermediate · Course · 1 - 4 Weeks

  • C

    Codio

    Linux for Security Experts

    Skills you'll gain: Vulnerability Scanning, Digital Forensics, Linux, Linux Administration, Network Security, User Accounts, Network Monitoring, System Monitoring, Hardening, Continuous Monitoring, Information Systems Security, Security Controls, Wireless Networks, Penetration Testing, Cybersecurity, Containerization, Incident Response

    5
    Rating, 5 out of 5 stars
    ·
    7 reviews

    Beginner · Course · 1 - 4 Weeks

Searches related to computer security

computer security incident management
computer security awareness training
computer security and systems management
computer security and systems management specialization
computer security and cryptography
computer security and networks
computer networks and network security
introduction to computer security
1…678…770

In summary, here are 10 of our most popular computer security courses

  • Beginning Security: Packt
  • Information Technology and Security Principles: Packt
  • Cybersecurity and Secure Software Design: Ball State University
  • Identifying Security Vulnerabilities: University of California, Davis
  • Cybersecurity: Protecting your Information on the Go: Kennesaw State University
  • Security & Ethical Hacking: Attacking Unix and Windows : University of Colorado Boulder
  • Cybersecurity Awareness For Everyone: Final Assessment: Kennesaw State University
  • How Computers Work: University of London
  • Enterprise and Infrastructure Security: New York University
  • Cyber Threats and Network Security Foundations: Edureka

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok