• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Data Security
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Learn a new tool or skill in an interactive, hands-on environment.
    Get in-depth knowledge of a subject by completing a series of courses and projects.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "data+security"

    • Google Cloud

      Security in Google Cloud

      Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Prompt Engineering, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Services, Application Deployment, Virtual Machines, Security Controls, Cloud Computing, Application Development, Data Storage Technologies, Threat Management, Virtual Private Networks (VPN)

      4.7
      Rating, 4.7 out of 5 stars
      ·
      49K reviews

      Intermediate · Specialization · 3 - 6 Months

    • University of Colorado System

      Computer Security and Systems Management

      Skills you'll gain: Windows Servers, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Cyber Security Policies, Systems Administration, Virtualization, Red Hat Enterprise Linux, Information Technology, Information Systems Security

      4.6
      Rating, 4.6 out of 5 stars
      ·
      1.9K reviews

      Beginner · Specialization · 3 - 6 Months

    • University of Colorado System

      Cybersecurity for Business

      Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Computer Security Awareness Training, Malware Protection, Risk Management, Vulnerability Assessments, Enterprise Security

      4.7
      Rating, 4.7 out of 5 stars
      ·
      1.8K reviews

      Beginner · Specialization · 3 - 6 Months

    • Google

      IT Security: Defense against the digital dark arts

      Skills you'll gain: Network Security, Information Systems Security, Cybersecurity, Encryption, Cyber Attacks, Security Awareness, Data Security, Threat Modeling, Security Management, Security Strategy, Computer Security Awareness Training, Information Assurance, Wireless Networks, Firewall, Malware Protection, Authentications, Authorization (Computing), Technical Support

      4.8
      Rating, 4.8 out of 5 stars
      ·
      25K reviews

      Beginner · Course · 1 - 3 Months

    • Google

      Connect and Protect: Networks and Network Security

      Skills you'll gain: Network Security, Hardening, Network Protocols, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)

      4.8
      Rating, 4.8 out of 5 stars
      ·
      6.2K reviews

      Beginner · Course · 1 - 4 Weeks

    • Google

      Tools of the Trade: Linux and SQL

      Skills you'll gain: Bash (Scripting Language), Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts

      4.8
      Rating, 4.8 out of 5 stars
      ·
      5.4K reviews

      Beginner · Course · 1 - 4 Weeks

    • University of Colorado System

      Secure Software Design

      Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Technical Design, Security Engineering, Software Architecture, Secure Coding, Software Design Patterns, Database Management, Software Engineering, Software Visualization, Software Development Life Cycle, Systems Design

      4.6
      Rating, 4.6 out of 5 stars
      ·
      435 reviews

      Beginner · Specialization · 3 - 6 Months

    • Google

      Assets, Threats, and Vulnerabilities

      Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption

      4.8
      Rating, 4.8 out of 5 stars
      ·
      3.6K reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: New
      New

      Illinois Tech

      Security: A Comprehensive Approach

      Skills you'll gain: Infrastructure As A Service (IaaS), Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, Amazon Web Services, System Configuration, Firewall, Cloud Computing Architecture, Data Security, Linux, System Monitoring

      Build toward a degree

      4.7
      Rating, 4.7 out of 5 stars
      ·
      25 reviews

      Intermediate · Specialization · 3 - 6 Months

    • University of Colorado System

      Advanced System Security Design

      Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Threat Detection, Firewall, Cybersecurity, Geographic Information Systems

      4.5
      Rating, 4.5 out of 5 stars
      ·
      625 reviews

      Beginner · Specialization · 3 - 6 Months

    • IBM

      Computer Networks and Network Security

      Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Information Systems Security, Intrusion Detection and Prevention, Endpoint Security, Network Infrastructure, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention

      4.7
      Rating, 4.7 out of 5 stars
      ·
      3.4K reviews

      Intermediate · Course · 1 - 3 Months

    • Codio

      Tools for Security Specialists

      Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Authorization (Computing), Threat Management, Security Strategy, Enterprise Risk Management (ERM), Business Risk Management, Cyber Security Policies

      4.8
      Rating, 4.8 out of 5 stars
      ·
      49 reviews

      Beginner · Specialization · 1 - 3 Months

    1234…9

    In summary, here are 10 of our most popular data+security courses

    • Security in Google Cloud: Google Cloud
    • Computer Security and Systems Management: University of Colorado System
    • Cybersecurity for Business: University of Colorado System
    • IT Security: Defense against the digital dark arts : Google
    • Connect and Protect: Networks and Network Security: Google
    • Tools of the Trade: Linux and SQL: Google
    • Secure Software Design: University of Colorado System
    • Assets, Threats, and Vulnerabilities: Google
    • Security: A Comprehensive Approach: Illinois Tech
    • Advanced System Security Design: University of Colorado System

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog
    • Teaching Center

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Do Not Sell/Share
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok