List of MOOCs (Massive Open Online Courses) on cyber security related topics.
Although cyber security is becoming more and more important, it is unfortunately the case that many traditional educational institutions fail to provide a reasonable offer in their portfolio. Unfortunately, many of the few offered study programs are often very theory-loaded and deficient in their quality. Current cyber security related topics are not even covered in the curriculum.
One solution to the aforementioned problem are massive open online courses (MOOCs) that often provide high quality educational courses to everyone with an internet connection.
Below you'll find a list of cyber security related courses on the largest MOOC platforms (Coursera, edX, Udacity). Most of them are timeless, which means you can access the course material anytime regardless of the course start or end date.
I'm trying to keep this list up to date.
Course Title | Provider | URL |
---|---|---|
Intro to Information Security | Georgia Institute of Technology | https://www.udacity.com/course/intro-to-information-security--ud459 |
Cybersecurity and Its Ten Domains | University System of Georgia | https://www.coursera.org/learn/cyber-security-domain |
Information Security: Context and Introduction | University of London | https://www.coursera.org/learn/information-security-data |
Cyber Security Basics: A Hands-on Approach | Universidad Carlos III de Madrid | https://www.edx.org/course/cyber-security-basics-hands-approach-uc3mx-inf-2x |
Cybersecurity and the Internet of Things | University System of Georgia | https://www.coursera.org/learn/iot-cyber-security/ |
Bitcoin and Cryptocurrency Technologies | Princeton University | https://www.coursera.org/learn/cryptocurrency/ |
Software Security | University of Maryland, College Park | https://www.coursera.org/learn/software-security/ |
International Cyber Conflicts | The State University of New York | https://www.coursera.org/learn/cyber-conflicts |
Cryptography | University of Maryland, College Park | https://www.coursera.org/learn/cryptography |
Usable Security | University of Maryland, College Park | https://www.coursera.org/learn/usable-security |
Hardware Security | University of Maryland, College Park | https://www.coursera.org/learn/hardware-security |
Cyber Security Economics | Delft University of Technology | https://www.edx.org/course/cyber-security-economics-delftx-secon101x |
Network Security | Rochester Institute of Technology | https://www.edx.org/course/network-security-ritx-cyber504x |
Cybersecurity Fundamentals | Rochester Institute of Technology | https://www.edx.org/course/cybersecurity-fundamentals-ritx-cyber501x-0 |
Cloud Computing Security | University System of Maryland & University of Maryland University College | https://www.edx.org/course/cloud-computing-security-usmx-university-maryland-university-cc617x |
Cyberwar, Surveillance and Security | University of Adelaide | https://www.edx.org/course/cyberwar-surveillance-security-adelaidex-cyber101x-0 |
Computer Forensics | Rochester Institute of Technology | https://www.edx.org/course/computer-forensics-ritx-cyber502x |
Cybersecurity Risk Management | Rochester Institute of Technology | https://www.edx.org/course/cybersecurity-risk-management-ritx-cyber503x |
Quantum Cryptography | Caltech & Delft University of Technology | https://www.edx.org/course/quantum-cryptography-caltechx-delftx-qucryptox |
Wiretaps to Big Data: Privacy and Surveillance in the Age of Interconnection | Cornell University | https://www.edx.org/course/wiretaps-big-data-privacy-surveillance-cornellx-engri1280x |
Feel free to extend the list. :)