Free Online Computer Security and Networks Courses

Learn to protect digital assets with computer security and networks courses. Whether you're an aspiring cybersecurity expert or network administrator, a computer security and networks course is essential.

67 Computer Security and Networks Courses

Google Cybersecurity

Google

Prepare for a new career in the high-growth field of cybersecurity, no degree or experience required. Get professional training designed and delivered by subject...

Google Professional Workspace Administrator

Google Cloud

This specialization has been developed to help administrators master the foundations of establishing and managing Google Workspace for their organization.\n\nYou...

Google Workspace Administration 日本語版

Google Cloud

Google Workspace Administration 専門講座は、組織の管理者が Google Workspace のベストプラクティスを確立して管理するための基礎をマスターできるように作られています。\n\nこの講座で受講者は、新しい...

Google Workspace Security 日本語版

Google Cloud

"「Google Workspace Security」は、Google Workspace Administration シリーズの 3 つ目のコースです。 このコースでは、ユーザーのパスワード...

Hands-on Internet of Things

University of Illinois at Urbana-Champaign

This specialization is intended for technologically minded persons who are interested in getting to know the latest in ubiquitous computing, also known as "Internet...

Hardware Security

University of Maryland, College Park

In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current...

Identifying Security Vulnerabilities in C/C++Programming

University of California, Davis

This course builds upon the skills and coding practices learned in both Principles of Secure Coding and Identifying Security Vulnerabilities, courses one and two,...

Introduction to Applied Cryptography

University of Colorado System

Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed...

Introduction to Architecting Smart IoT Devices

EIT Digital

What will you learn? Embedded Systems are so ubiquitous that some of us take them for granted: we find them in smartphones, GPS systems, airplanes, and so on. But...

Introduction to Blockchain for Financial Services

INSEAD

In this first course of the specialization, we will discuss the limitations of the Internet for business and economic activity, and explain how blockchain technology...

Introduction to Computer Information Systems

University of California, Irvine

This Specialization is intended for anyone seeking to learn basic computer skills. Through 3 courses, you will study computer hardware, software, and data safety....

Introduction to Cyber Attacks

New York University

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks...

Introduction to Cyber Security

New York University

Introduction to Cyber Security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. The...

Introduction to Cybersecurity & Risk Management

University of California, Irvine

In this case-based Specialization, you will be introduced to the field of cybersecurity through the world of security governance and risk management.\n\nThroughout...

Introduction to Junos OS

Juniper Networks

This course provides students with the foundational knowledge required to work with the Junos operating system and to configure Junos devices. The course then delves...

Introduction to Risk Management

University of California, Irvine

In this course, you will learn about risk assessment techniques and how to implement a number of strategies that will ensure the protection of assets. You will learn...

Message Encoding/Decoding in Python with GUI

Coursera Project Network

In this 1-hour long project-based course, you will learn how to secure your information by encoding and decoding the messages. In this project, You’ll be able...

OWASP Top 10 - 2021

Infosec

In this learning path, we will look at the OWASP organization and what its purpose is. We will then examine Broken Access Control, Cryptographic Failures, Injection...