✕ Clear filters
594 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 176,281📚 Coursera 16,097
Intro to Secure Coding and Input Validation in Android
📚 Coursera Course ↗
Self-paced
Cybersecurity
Intro to Secure Coding and Input Validation in Android
Coursera Beginner Opens on Coursera ↗
CCNA Advanced – WAN, Security, and Network Services
📚 Coursera Course ↗
Self-paced
Cybersecurity
CCNA Advanced – WAN, Security, and Network Services
Coursera Intermediate Opens on Coursera ↗
Writing Secure Code in ASP.NET
📚 Coursera Course ↗
Self-paced
Cybersecurity
Writing Secure Code in ASP.NET
Coursera Intermediate Opens on Coursera ↗
Information Security Incident Management
📚 Coursera Course ↗
Self-paced
Cybersecurity
Information Security Incident Management
Coursera Advanced Opens on Coursera ↗
 Incident Response and Recovery
📚 Coursera Course ↗
Self-paced
Cybersecurity
Incident Response and Recovery
Coursera Beginner Opens on Coursera ↗
Practical Blockchain and Cryptocurrency
📚 Coursera Course ↗
Self-paced
Cybersecurity
Practical Blockchain and Cryptocurrency
Coursera Intermediate Opens on Coursera ↗
Advanced Security Architecture
📚 Coursera Course ↗
Self-paced
Cybersecurity
Advanced Security Architecture
Coursera Intermediate Opens on Coursera ↗
Technical Deep Dive with Incident Response Tools
📚 Coursera Course ↗
Self-paced
Cybersecurity
Technical Deep Dive with Incident Response Tools
Coursera Intermediate Opens on Coursera ↗
Computer Networks and Network Security
📚 Coursera Course ↗
Self-paced
Cybersecurity
Computer Networks and Network Security
Coursera Intermediate Opens on Coursera ↗
Fundamentals of Network Security and Cryptography
📚 Coursera Course ↗
Self-paced
Cybersecurity
Fundamentals of Network Security and Cryptography
Coursera Beginner Opens on Coursera ↗
API Basics 2: Build a Blog (REST, URLs & HTTP Requests)
📚 Coursera Course ↗
Self-paced
Cybersecurity
API Basics 2: Build a Blog (REST, URLs & HTTP Requests)
Coursera Beginner Opens on Coursera ↗
Analyze Cybersecurity Risks in Financial Systems
📚 Coursera Course ↗
Self-paced
Cybersecurity
Analyze Cybersecurity Risks in Financial Systems
Coursera Beginner Opens on Coursera ↗
Security Command Center: Identify and Prioritize Risks
📚 Coursera Course ↗
Self-paced
Cybersecurity
Security Command Center: Identify and Prioritize Risks
Coursera Intermediate Opens on Coursera ↗
Keamanan IT: Pertahanan terhadap Kejahatan Digital
📚 Coursera Course ↗
Self-paced
Cybersecurity
Keamanan IT: Pertahanan terhadap Kejahatan Digital
Coursera Intermediate Opens on Coursera ↗
In the Trenches: Security Operations Center
📚 Coursera Course ↗
Self-paced
Cybersecurity
In the Trenches: Security Operations Center
Coursera Intermediate Opens on Coursera ↗
Security Hardening
📚 Coursera Course ↗
Self-paced
Cybersecurity
Security Hardening
Coursera Intermediate Opens on Coursera ↗
Advanced Ethical Hacking & Cybersecurity
📚 Coursera Course ↗
Self-paced
Cybersecurity
Advanced Ethical Hacking & Cybersecurity
Coursera Intermediate Opens on Coursera ↗
Foundations of Cybersecurity
📚 Coursera Course ↗
Self-paced
Cybersecurity
Foundations of Cybersecurity
Coursera Beginner Opens on Coursera ↗
Cybersecurity Threat Vectors and Mitigation
📚 Coursera Course ↗
Self-paced
Cybersecurity
Cybersecurity Threat Vectors and Mitigation
Coursera Beginner Opens on Coursera ↗
Incident Response and Threat Mitigation
📚 Coursera Course ↗
Self-paced
Cybersecurity
Incident Response and Threat Mitigation
Coursera Intermediate Opens on Coursera ↗
Cloud Next Generation Firewall : évaluer vos besoins
📚 Coursera Course ↗
Self-paced
Cybersecurity
Cloud Next Generation Firewall : évaluer vos besoins
Coursera Intermediate Opens on Coursera ↗
Exploit Development, Malware, & Defensive Strategies
📚 Coursera Course ↗
Self-paced
Cybersecurity
Exploit Development, Malware, & Defensive Strategies
Coursera Intermediate Opens on Coursera ↗
Automated Cyber Security Incident Response
📚 Coursera Course ↗
Self-paced
Cybersecurity
Automated Cyber Security Incident Response
Coursera Intermediate Opens on Coursera ↗
Advanced Penetration Testing with Kali Linux
📚 Coursera Course ↗
Self-paced
Cybersecurity
Advanced Penetration Testing with Kali Linux
Coursera Advanced Opens on Coursera ↗
Security & Ethical Hacking: Attacking Unix and Windows
📚 Coursera Course ↗
Self-paced
Cybersecurity
Security & Ethical Hacking: Attacking Unix and Windows
Coursera Beginner Opens on Coursera ↗
Intermediate Ethical Hacking Techniques
📚 Coursera Course ↗
Self-paced
Cybersecurity
Intermediate Ethical Hacking Techniques
Coursera Intermediate Opens on Coursera ↗
JavaScript Security Part 1
📚 Coursera Course ↗
Self-paced
Cybersecurity
JavaScript Security Part 1
Coursera Intermediate Opens on Coursera ↗
CFR: Incident Analysis, Response, and Forensics
📚 Coursera Course ↗
Self-paced
Cybersecurity
CFR: Incident Analysis, Response, and Forensics
Coursera Advanced Opens on Coursera ↗
AWS: Infrastructure Security
📚 Coursera Course ↗
Self-paced
Cybersecurity
AWS: Infrastructure Security
Coursera Beginner Opens on Coursera ↗
Previous OWASP Risks
📚 Coursera Course ↗
Self-paced
Cybersecurity
Previous OWASP Risks
Coursera Intermediate Opens on Coursera ↗
Negotiation  Fundamentals
📚 Coursera Course ↗
Self-paced
Cybersecurity
Negotiation Fundamentals
Coursera Intermediate Opens on Coursera ↗
Encryption and Decryption using C++
📚 Coursera Course ↗
Self-paced
Cybersecurity
Encryption and Decryption using C++
Coursera Beginner Opens on Coursera ↗
Cybersecurity Fundamentals for High-Tech Manufacturing
📚 Coursera Course ↗
Self-paced
Cybersecurity
Cybersecurity Fundamentals for High-Tech Manufacturing
Coursera Beginner Opens on Coursera ↗
OWASP Top 10 - Risks 6-10
📚 Coursera Course ↗
Self-paced
Cybersecurity
OWASP Top 10 - Risks 6-10
Coursera Intermediate Opens on Coursera ↗
Systems and Cybersecurity Fundamentals Part 2
📚 Coursera Course ↗
Self-paced
Cybersecurity
Systems and Cybersecurity Fundamentals Part 2
Coursera Intermediate Opens on Coursera ↗
Ethical Hacking - Capture the Flag Walkthroughs - v2
📚 Coursera Course ↗
Self-paced
Cybersecurity
Ethical Hacking - Capture the Flag Walkthroughs - v2
Coursera Intermediate Opens on Coursera ↗
Cyber Threats and Network Security Foundations
📚 Coursera Course ↗
Self-paced
Cybersecurity
Cyber Threats and Network Security Foundations
Coursera Intermediate Opens on Coursera ↗
Network Defense Essentials (NDE)
📚 Coursera Course ↗
Self-paced
Cybersecurity
Network Defense Essentials (NDE)
Coursera Beginner Opens on Coursera ↗
Strategic Edge Security Management
📚 Coursera Course ↗
Self-paced
Cybersecurity
Strategic Edge Security Management
Coursera Beginner Opens on Coursera ↗
Model Context Protocol (MCP) Mastery
📚 Coursera Course ↗
Self-paced
Cybersecurity
Model Context Protocol (MCP) Mastery
Coursera Intermediate Opens on Coursera ↗
Enterprise Firewall Administrator
📚 Coursera Course ↗
Self-paced
Cybersecurity
Enterprise Firewall Administrator
Coursera Intermediate Opens on Coursera ↗
Digital Marketing Trends
📚 Coursera Course ↗
Self-paced
Cybersecurity
Digital Marketing Trends
Coursera Beginner Opens on Coursera ↗
Introduction to Cybersecurity Foundations
📚 Coursera Course ↗
Self-paced
Cybersecurity
Introduction to Cybersecurity Foundations
Coursera Beginner Opens on Coursera ↗
Cybersecurity with Python: Beginner to Advanced
📚 Coursera Course ↗
Self-paced
Cybersecurity
Cybersecurity with Python: Beginner to Advanced
Coursera Beginner Opens on Coursera ↗
PowerShell for Penetration Testing
📚 Coursera Course ↗
Self-paced
Cybersecurity
PowerShell for Penetration Testing
Coursera Intermediate Opens on Coursera ↗
Designing Robust Information System Security Architectures
📚 Coursera Course ↗
Self-paced
Cybersecurity
Designing Robust Information System Security Architectures
Coursera Intermediate Opens on Coursera ↗
Quantum Computing For Everyone - An Introduction
📚 Coursera Course ↗
Self-paced
Cybersecurity
Quantum Computing For Everyone - An Introduction
Coursera Beginner Opens on Coursera ↗
Securing AI and Advanced Topics
📚 Coursera Course ↗
Self-paced
Cybersecurity
Securing AI and Advanced Topics
Coursera Intermediate Opens on Coursera ↗