Cybersecurity courses
About Cybersecurity
Cybersecurity is a fast-growing field that addresses the security risks of our increasingly connected digital world. Learn cybersecurity, and you will learn how users, companies, and even governments protect themselves and recover from cyber threats and attacks. Start defending yourself or your organization, or let this be your first step to becoming a security professional!
Cybersecurity courses
Filters66 results
Level
Price
View plansType
Average time to complete
Average based on combined completion rates — individual pacing in lessons, projects, and quizzes may vary.
Most relevant
66 results
Most relevant
- Master IT security basics and prep for the CompTIA Security+ exam with hands-on learning on threats, cryptography, governance, identity management and more.
- Includes 20 Courses
- Intermediate.14 hours
- Validate your cybersecurity skills with CC certification. Learn business continuity, disaster recovery, incident response, and security operations.
- Includes 10 Courses
- Beginner Friendly.7 hours
- Dive into ethical hacking and generative AI. Learn to leverage AI for cybersecurity and understand the dynamics of security and innovation.
- Intermediate.1 hour
- In this course, you will learn what it means to be an Ethical Hacker, and practice tools and techniques used to hack ethically.
- With Certificate
- Beginner Friendly.1 hour
- Prepare for PT0-003 CompTIA PenTest+ certification exam covering penetration testing, vulnerability management, security assessments and network security.
- Includes 19 Courses
- Intermediate.29 hours
- Prepare for SC-900 Microsoft Security, Compliance and Identity Fundamentals certification exam covering Azure security, compliance principles and identity management.
- Includes 7 Courses
- Beginner Friendly.5 hours
- Learn DevSecOps in Azure: Explore Azure DevOps, understand DevSecOps best practices and challenges, and discover Azure Pipelines. Delve into Configuration Scanning, Azure AD, Key Vault, and Azure Policy.
- Intermediate.1 hour
- Discover how generative AI enhances ethical hacking techniques and detects system vulnerabilities. Learn best practices for preventing system hacking and conducting AI-driven penetration tests.
- Intermediate.1 hour
- Leverage generative AI for cybersecurity. Explore AI-powered threat detection, classification, and prevention. Discover ethical considerations and future trends.
- Intermediate.2 hours
- Learn about the fast-growing field of cybersecurity and how to protect your data and information from digital attacks.
- Beginner Friendly.3 hours
- Hackers and cyber threats are a fact of today's modern, digital world. Everyone needs to be able to protect themselves from these threats.
- Beginner Friendly.1 hour
- Achieve CISSP certification by mastering security governance, risk management, and ethical practices in information systems design, implementation, and compliance
- Includes 30 Courses
- Advanced.19 hours
- Learn secure coding in Java. Identify and mitigate common threats like XSS, SQL injection, and more. Perfect for Java developers and security professionals.
- With Certificate
- Intermediate.1 hour
- Learn secure coding in C. Identify and mitigate threats like buffer overflows, memory leaks, and UAF vulnerabilities. Ideal for C developers and security profes
- With Certificate
- Intermediate.1 hour
- Learn DevSecOps Fundamentals: Explore the roles of DevOps and DevSecOps in IT. Understand benefits, requirements, and challenges. Discover industry applications and team preparation steps.
- Intermediate.1 hour
- Learn how to protect your business against cyber attacks with your cybersecurity team, risk management, an incident response plan, and more!
- With Certificate
- Beginner Friendly.1 hour
- Explore DevSecOps in AWS: Learn about roles, implementation essentials, AWS CI/CD services, testing and monitoring tools, and implementation hurdles.
- Intermediate.2 hours
- Learn the Cybersecurity fundamentals that will lay a foundation for securing your technology and personal life from dangerous cyber threats.
- Includes 5 Courses
- With Certificate
- Beginner Friendly.3 hours
- Elevate your career with CISM training, mastering information security governance, risk management, incident response, data privacy, and regulatory compliance.
- Includes 20 Courses
- Intermediate.25 hours
- Learn the basics of secure coding and how to have a secure coder mindset.
- Beginner Friendly.< 1 hour
- Learn about Nmap and see why it's such a popular tool for ethical hacking and ethical hackers.
- Includes 5 Courses
- With Certificate
- Beginner Friendly.4 hours
- Prepare for AZ-500 Microsoft Azure Security Technologies certification exam covering security controls, identity management, cloud infrastructure and threat response.
- Includes 12 Courses
- Intermediate.23 hours
- In this course, you'll learn how to implement User Authentication and Authorization in an Express web application.
- Intermediate.5 hours
- Explore ethical hacking techniques to fight malware and social engineering. Learn how generative AI enhances threat detection and prevention.
- Intermediate.1 hour
- Master interview strategies for an entry-level Cybersecurity Analyst interview with this Skill Path.
- Includes 8 Courses
- With Certificate
- Intermediate.3 hours
- Learn how to defend against malicious attacks and improve user experiences using sessions, cookies, and password authentication.
- Includes 5 Courses
- With Certificate
- Intermediate.8 hours
- Learn DevSecOps in GCP: Explore GCP features, five layers of GCP security, products, services, zero trust security, CI/CD, Google Cloud logging services, and security tools.
- Intermediate.1 hour
- Explore cloud computing, IoT, and AI interplay. Learn about common cloud service and IoT vulnerabilities, conduct simulated hacks, and reinforce security using generative AI.
- Intermediate.2 hours
- Achieve SecurityX certification with in-depth knowledge of risk management, cloud and AI security, and incident response for cybersecurity success.
- Includes 23 Courses
- Advanced.33 hours
- Learn strategies for risk management and quantitative and qualitative risk analysis and dive deeper into the world of cybersecurity.
- Includes 6 Courses
- With Certificate
- Beginner Friendly.1 hour
- Explore DevSecOps for containers: Learn virtualization, containerization, Kubernetes, Docker, DevSecOps and containers, Containers security challenges, API microgateways, and how to build modular container images.
- Intermediate.1 hour
- Learn DevSecOps essentials: SAST and DAST tools like Bandit, Clean Code, LGTM, OWASP ZAP, and Nikto, plus dependency analysis and IaC security tools. Explore secrets and vulnerability management.
- Intermediate.1 hour
- Prepare for the CSSLP certification by acquiring the knowledge to create and maintain secure software throughout its life cycle.
- Includes 15 Courses
- Intermediate.24 hours
- Learn the DevSecOps life cycle. Explore waterfall and agile models, different phases in detail, DevSecOps pipelines, automation benefits, and shift left testing.
- Intermediate.2 hours
- Build a strong foundation in cybersecurity with business continuity, security principles, disaster recovery, incident response, network security, and more.
- Includes 18 Courses
- Intermediate.17 hours
- Fortify mobile platform security using generative AI. Learn AI-driven attack methods, fix app vulnerabilities, and understand AI's role in mobile hacking.
- Intermediate.1 hour
- You will learn about Security Logging and Monitoring Failures, what are they, and how to prevent them.
- Beginner Friendly.< 1 hour
- You will learn about some critical injection attacks; shell injection attacks, email header injection attacks, and SQL injection attacks.
- Intermediate.1 hour
- Learn DevSecOps on-premises: Compare on-premises, cloud, and hybrid solutions, understand DevSecOps team roles, and focus on the three pillars of DevSecOps.
- Intermediate.2 hours
- Learn how to identify and the ways to prevent Cross-Site Request Forgery Attacks from a system.
- Beginner Friendly.< 1 hour
- Become a cloud security expert with CCSP certification. Gain skills in cloud architecture, data security, identity management, and cloud compliance strategies.
- Includes 22 Courses
- Intermediate.10 hours
- Secure CI/CD with DevSecOps: Explore CI/CD and DevOps basics, enhance security with effective DevSecOps pipelines, identify pipeline security vulnerabilities, and examine security recommendations.
- Intermediate.1 hour
- Explore the fusion of traditional stealth hacking techniques with generative AI. Learn how AI detects and mitigates track-covering activities through real-world case studies.
- Intermediate.1 hour
- Learn how to identify and prevent different types of Cross-Site Scripting attacks in Node.js apps.
- With Certificate
- Intermediate.1 hour
- Dive into the dangerous world of AI phishing and learn how to protect yourself from attacks and misinformation.
- With Certificate
- Beginner Friendly.1 hour
- You will learn about Broken Access Control, what it is and how to prevent it.
- Intermediate.< 1 hour
- Uncover DevSecOps security principles. Explore the evolution of computer systems and the Internet, InfoSec tenets, types, and risks. Learn the benefits of implementing DevSecOps.
- Beginner Friendly.2 hours
- You will learn about Identification and Authentication Failures, what are they, and how to prevent them.
- Beginner Friendly.< 1 hour
- Learn how to protect Node.js Applications from SQL Injection, CSRF, & XSS Attacks, JavaScript safety practices, and what to do when something goes wrong.
- With Certificate
- Intermediate.2 hours
- Leverage AI to enhance data protection and validation. Learn AI benefits and security risk, data protection principles, and how to protect sensitive data and improve your organization's security posture.
- Intermediate.2 hours
- Discover how Generative AI like ChatGPT can be used to create Python unit tests. Understand the Security Test Pyramid and best practices for AI unit testing.
- With Certificate
- Intermediate.< 1 hour
- You will learn about Software and Data Integrity Failures, what they are, and how to prevent them.
- Beginner Friendly.< 1 hour
- Learn how to identify and defend against SQL Injections in Node.js applications.
- With Certificate
- Intermediate.1 hour
- Explore the convergence of ethical hacking and AI. Learn how generative AI strengthens network scanning and enumeration in cybersecurity.
- Intermediate.1 hour
- Understand network and perimeter hacking, AI's impact on security, and AI-driven defenses. Explore real-world examples and fortify network defenses.
- Intermediate.1 hour
- Learn secure coding for Angular applications. Identify and mitigate threats like XSS, IDOR, prototype pollution, and more. Ideal for Angular developers.
- With Certificate
- Intermediate.1 hour
- You will learn about Server-Side Request Forgery, what it is and how to prevent it.
- Intermediate.< 1 hour
- You will learn about Security Misconfigurations, what are they, and how to prevent them.
- Beginner Friendly.< 1 hour
- Explore DevSecOps methodology: Discover frameworks like CALMs and Three Ways, integration of security, migration strategies from DevOps to DevSecOps, and DevSecOps phases and decentralization.
- Intermediate.1 hour
- Explore ethical hacking with AI for web application and database security. Learn to mitigate AI-assisted attacks, secure databases, and patch vulnerabilities effectively.
- Intermediate.2 hours
- Explore AI's role in cybersecurity with IDS: IDS types and methods, benefits and challenges, and how to prevent security breaches. Discover AI's prediction, detection, and response capabilities.
- Intermediate.2 hours
- Enhance email security with AI. Learn to combat phishing, malware, and spam while reducing administrative efforts and boosting cyber resilience.
- Intermediate.1 hour
- Discover how generative AI enhances cybersecurity tools. Learn about AI models, integration challenges, and boosting predictive capabilities for proactive security.
- Intermediate.2 hours
- Learn AI in authentication, covering biometrics, vulnerabilities, and behavioral analysis. Explore AI-driven security for user verification through selfies and voice.
- Intermediate.3 hours
- Uncover the benefits of AI in identity security. Learn about securing access, preventing identity theft, ethical considerations, and integrating AI into existing frameworks.
- Intermediate.1 hour
- Leverage generative AI and reconnaissance for advanced cybersecurity defense. Learn how ethical hackers utilize these techniques.
- Intermediate.1 hour
Related resources
Related projects
- Practice projectJavaScript • SQL • Web development • Cybersecurity
Codey's Confectionery: Preventing SQL Injection Attacks
Practice using prepared statements and form validation to prevent SQL injection attacks.More guidance, 60 min - Practice projectJavaScript • Web development • Cybersecurity
Codey's Confectionery: Preventing Cross-Site Request Forgery (CSRF) Attacks
This project will test your skills at preventing Cross-Site Request Forgery (CSRF) attacks in Node.js.More guidance, 60 min - Practice projectJavaScript • Web development • Cybersecurity • Front-end engineer • Back-end engineer
Restreview: Preventing Cross Site Scripting (XSS) Attacks
Secure an Express application from Cross-Site Scripting (XSS) Attacks!More guidance, 120 min - Practice projectJavaScript • Cybersecurity
Securing School Data: Data Security
Apply what you learned about Postgres security and environment variables!More guidance, 25 min
Related articles
- Article
Authentication vs Authorization vs Encryption
Learn the difference between authentication vs authorization vs encryption and how these three pillars secure identity, access, and data. - Article
Important PowerShell Commands for Cybersecurity Analysts
Discover essential PowerShell commands every cybersecurity analyst should know. Learn how to enhance your security workflows using PowerShell. - Article
OSI Model: Complete Guide to the 7 Network Layers
Learn the OSI model’s 7 layers and how data travels across networks. Explore key protocols like TCP, IP, and HTTP with examples for beginners. - Article
Public Key Infrastructure (PKI)
Learn about PKI: What it is, how it works, and what we use it for!