• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Computer Security
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Learn a new tool or skill in an interactive, hands-on environment.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.
    Earn career credentials while taking courses that count towards your Master’s degree.
    Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.
    Earn a university-issued career credential in a flexible, interactive format.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "computer security"

    • Status: Free Trial
      Free Trial
      U

      Universidad de los Andes

      Seguridad en la red

      Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Information Systems Security, Cybersecurity, Cloud Security, Intrusion Detection and Prevention, Data Security, Security Controls, Cloud Computing

      4.8
      Rating, 4.8 out of 5 stars
      ·
      116 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      U

      University of London

      How Computers Work

      Skills you'll gain: Computer Science, Computer Systems, Web Applications, Computer Literacy, Network Security, Computer Networking, Computational Thinking, Debugging, Web Design and Development, Cybersecurity, Problem Management, Software Architecture, Data Storage

      4.6
      Rating, 4.6 out of 5 stars
      ·
      568 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      U

      University of Colorado Boulder

      Security & Ethical Hacking: Attacking the Network

      Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers

      Build toward a degree

      4.6
      Rating, 4.6 out of 5 stars
      ·
      7 reviews

      Intermediate · Course · 1 - 3 Months

    • U

      University of Maryland, College Park

      Hardware Security

      Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Vulnerability Assessments, Application Specific Integrated Circuits, Exploit development, Cryptography, Systems Design, Encryption, Exploitation techniques, Technical Design, Emerging Technologies

      4.3
      Rating, 4.3 out of 5 stars
      ·
      690 reviews

      Mixed · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      C

      Codio

      Linux for Security Experts

      Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Linux, Linux Administration, Network Security, Role-Based Access Control (RBAC), Linux Commands, User Accounts, Network Monitoring, System Monitoring, Network Administration, Hardening, Information Systems Security, Security Controls, Wireless Networks, Firewall, Penetration Testing, Cybersecurity, Containerization, File Management

      5
      Rating, 5 out of 5 stars
      ·
      7 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Preview
      Preview
      L

      LearnQuest

      Enhancing Mac Security: Strategies for Protection

      Skills you'll gain: Mac OS, Network Security, Threat Management, Endpoint Security, Threat Detection, Computer Security Awareness Training, Security Strategy, Information Systems Security, Security Controls, Network Protocols, Automation

      Beginner · Course · 1 - 4 Weeks

    • Status: Preview
      Preview
      K

      Kennesaw State University

      Cybersecurity and Its Ten Domains

      Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Business Continuity, Cryptography, Secure Coding, Systems Development Life Cycle, Security Controls, Law, Regulation, and Compliance, Infrastructure Security, Safety and Security, Identity and Access Management, Governance, Risk Management

      4.3
      Rating, 4.3 out of 5 stars
      ·
      2.4K reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      I

      Illinois Tech

      Cloud Computing Security - Master's

      Skills you'll gain: Cloud Security, Identity and Access Management, AWS Identity and Access Management (IAM), Incident Response, Cloud Computing, Cloud Computing Architecture, Data Security, Application Security, Network Security, Encryption, Role-Based Access Control (RBAC), Amazon Web Services, Key Management, Infrastructure Security, Security Controls, Firewall, Continuous Monitoring, Multi-Factor Authentication

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      K

      Kennesaw State University

      Managing Network Security

      Skills you'll gain: Network Security, Network Administration, Security Management, Firewall, Network Monitoring, Cybersecurity, General Networking, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, System Monitoring, Security Awareness, TCP/IP, Intrusion Detection and Prevention, Cloud Computing, Threat Detection

      4.8
      Rating, 4.8 out of 5 stars
      ·
      234 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      A

      Akamai Technologies, Inc.

      Introduction to IT Security

      Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Risk Management

      4.9
      Rating, 4.9 out of 5 stars
      ·
      20 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      U

      University of Colorado Boulder

      Security & Ethical Hacking: Attacking Unix and Windows

      Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture

      Build toward a degree

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      K

      Kennesaw State University

      Cybersecurity: Protecting your Information on the Go

      Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Computer Security Awareness Training, Personally Identifiable Information, Information Privacy, Emerging Technologies

      5
      Rating, 5 out of 5 stars
      ·
      6 reviews

      Beginner · Course · 1 - 3 Months

    Searches related to computer security

    computer security and systems management
    proactive computer security
    introduction to computer security
    computer networks and network security
    fundamentals of computer network security
    introduction to computers and operating systems and security
    azure: compute, storage, and database security
    1…567…608

    In summary, here are 10 of our most popular computer security courses

    • Seguridad en la red: Universidad de los Andes
    • How Computers Work: University of London
    • Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
    • Hardware Security: University of Maryland, College Park
    • Linux for Security Experts: Codio
    • Enhancing Mac Security: Strategies for Protection: LearnQuest
    • Cybersecurity and Its Ten Domains: Kennesaw State University
    • Cloud Computing Security - Master's: Illinois Tech
    • Managing Network Security: Kennesaw State University
    • Introduction to IT Security: Akamai Technologies, Inc.

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Skills

    • Artificial Intelligence (AI)
    • Cybersecurity
    • Data Analytics
    • Digital Marketing
    • English Speaking
    • Generative AI (GenAI)
    • Microsoft Excel
    • Microsoft Power BI
    • Project Management
    • Python

    Certificates & Programs

    • Google Cybersecurity Certificate
    • Google Data Analytics Certificate
    • Google IT Support Certificate
    • Google Project Management Certificate
    • Google UX Design Certificate
    • IBM Data Analyst Certificate
    • IBM Data Science Certificate
    • Machine Learning Certificate
    • Microsoft Power BI Data Analyst Certificate
    • UI / UX Design Certificate

    Industries & Careers

    • Business
    • Computer Science
    • Data Science
    • Education & Teaching
    • Engineering
    • Finance
    • Healthcare
    • Human Resources (HR)
    • Information Technology (IT)
    • Marketing

    Career Resources

    • Career Aptitude Test
    • Examples of Strengths and Weaknesses for Job Interviews
    • High-Income Skills to Learn
    • How Does Cryptocurrency Work?
    • How to Highlight Duplicates in Google Sheets
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Preparing for the PMP Certification
    • Signs You Will Get the Job After an Interview
    • What Is Artificial Intelligence?

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • Share your Coursera learning story

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok