Free Online Security Courses

Protect digital landscapes with security courses that focus on cybersecurity, network protection, and data encryption. Enrolling in a security course will prepare you for roles in IT security and cyber defense.

82 Security Courses

(ISC)² Systems Security Certified Practitioner (SSCP)

(ISC)²

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security...

Advanced Python - Reconnaissance

Infosec

Welcome to advanced Python for Cybersecurity. The Reconnaissance course demonstrates the use of Python to automate the process of performing reconnaissance on target...

Advanced Python Scripting for Cybersecurity

Infosec

Python is one of the most popular and widely-used programming languages in the world, due to its high usability and large collection of libraries. This learning...

Akamai Network Engineering

Akamai Technologies, Inc.

Are you interested in learning how large global network operations work? Does managing 30% of the internet traffic globally intrigue you? Then the Network Engineering...

Automating Response to Phishing with Cortex XSOAR

Google Cloud

This is a self-paced lab that takes place in the Google Cloud console. Work through an actual email phishing use case using Cortex XSOAR’s phishing response playbook....

C++ Interacting with the World and Error Handling

Infosec

Explore the C and C++ languages. Look at the specificity of the C/C++ languages and how this impacts security, ways C/C++ can interact with the external world, error...

C++ Superpowers and More

Infosec

Explore the C and C++ languages. Look at the specificity of the C/C++ languages and how this impacts security, ways C/C++ can interact with the external world, error...

Certified in Cybersecurity

(ISC)²

Congratulations on your interest in pursuing a career in cybersecurity. The Certified in Cybersecurity (CC) certification will demonstrate to employers that you...

Check Point Jump Start: Maestro Hyperscale Network Security

Check Point Software Technologies Ltd.

In this course brought to you by industry leader Check Point, they will cover the Maestro Orchestrator initial installation, creation and configuration of security...

Check Point Jump Start: Product Deployment

Check Point Software Technologies Ltd.

In this course, you will learn the concept of software deployment and the methods and tools used for deployment of Check Point products. And, we will drill down...

Cloud and Wireless Security

(ISC)²

Course 6: Cloud and Wireless Security Welcome to course six. This course applies to security concepts, ideas, and considerations to two major changes that we have...

Computer Forensics

Infosec

This three part InfoSec Specialization covers a wide variety of Computer Forensics topics. In the Digital Forensics Concepts course, you will learn about legal considerations...

Computer Security and Systems Management

University of Colorado System

The Computer Security and Systems Management Specialization focuses on computing in an enterprise environment. Combining both theory and real world experience and...

Cyber Incident Response

Infosec

The Cyber Incident Response Specialization will give students a high-level understanding of incident response processes. Students will learn about Incident Response...

Cyber Threat Hunting

Infosec

Learn repeatable, documentable cyber threat hunting methodologies and types of tools that will make your threat hunting more effective. This learning path progresses...

Cybersecurity Capstone: Breach Response Case Studies

IBM

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will...

Cybersecurity Compliance Framework & System Administration

IBM

This course gives you the background needed to understand the key cybersecurity compliance and industry standards. This knowledge will be important for you to learn...

Cybersecurity for Business

University of Colorado System

It seems anymore that you can't listen to the news without hearing of a data breach. You may have heard it said before that there are 2 types of companies out there,...