The Best Free Cyber Security and Information Security Courses

In this 2020, there are no excuses to start learning about topics we like. This note offers you several beginner-oriented courses on various cybersecurity and information security edges. We are sure that the quality of the training received is high, and several of these courses are backed by important educational institutions.

information-security-course

General introductory courses

Cryptography (Part One) – Coursera

Be part of a miniseries of two courses. It is one of the most popular and long-lived portal since it has been launched on the web. It is one of the essential skills to implement the protection of information in computer systems. You will learn about authenticated encryption, basic key exchange, public key encryption and much more. It has an hourly charge of approximately 12 to 13 hours, including the final exam.

If you want to access an official certificate, it will cost USD 79. It is backed by the prestigious Stanford University . You can access the course here .


Cybersecurity Basics: A Hands-on Approach – edX

According to the portal itself, this is an intermediate level course. However, anyone who only has essential skills to use a computer and surf the Internet can participate. It offers a complete overview of what Cybersecurity, reverse engineering, vulnerabilities and other issues are. It lasts 6 weeks and proposes to dedicate 5 to 7 hours of study per week to finish it successfully.

However, the certification will cost an additional USD 50. So, if you want to start your path by training in cybersecurity, with this course you can start. It is backed by the Carlos III University of Madrid . You can access the course here .


Governance of Personal Data in the Digital Age – edX

It will help you to understand about data governance, the criteria to consider when formulating public policies when drafting laws on data protection and privacy. This course is more oriented to the legal implications of personal data, its manipulation and the deviations that these activities could have. However, it is still very useful to expand knowledge and apply it in your environment. It lasts 4 weeks and proposes to dedicate 6 to 8 hours of study per week to finish it.

In this case, the certification will have an additional cost of 50 USD if you want to formalize this training. It is backed by the Pontificia Universidad Javeriana de Colombia . You can access the course here .


Mobile Security – ESET Academy

You will know the various threats to which your mobile device may be exposed. In addition, you will know about the preventive measures you must take to prevent them and protect the daily use of mobile phones. The course has no cost. You can access the course here .


How to build a secure home network – ESET Academy

You will learn about what you need to secure a home network. You will know about the details of each of its phases, the main types of Internet connection, setting configuration parameters for the router. On the other hand, how to set up computers and the wireless network in general.

Of course, you will receive lessons on how to optimize the network in favor of security when connecting to it. Both the router side, such as computers and other devices that would like to connect. You can access the course here .


Specific safety courses ideal for beginners

Network Security – Udacity

Some of the topics you will learn are: cryptography, security systems, authentication, key management, intrusion detection, detection and mitigation of DDoS attacks and more. By completing this course, you will gain the necessary skills to begin conducting assessments on networks both at work and academic levels.

A particularity that makes this course quite attractive is that most of the topics discussed have different papers and research carried out in the sector. In addition, you will get the links to access this documentation. It is part of a Nanodegree type program called Introduction to Programming . Details of costs and payment facilities can be found on the Udacity portal. You can access the course here .


Management and incident response – ESET Academy

One of the great challenges when it comes to starting to work in security is, what to do when an incident occurs? What is the action plan for each case? This course begins to pave the way for you to know how and what to do. It is completely free.

We must not only know how to respond to these incidents, but also measure the times and propose those that fit a quick and effective response. You can access the course here .


Introduction to SIEM tools – Cybrary

Cybrary is one of the most popular training portals specialized in cybersecurity. You can access free courses and with the bonus of getting certified. This is one of them! The acronym for SIEM responds to Security Information Event Management. It is the combination of the management of Security Information and Security Event.

Learning and implementing the SIEM system in your environment has great benefits: Greater efficiency in operations, less impact of security breaches and lower cost due to proper prevention and mitigation. You can access the course here .


Fundamentals of Vulnerability Management – Cybrary

According to the portal, “Vulnerability management is a continuous process of information security risks that requires monitoring by management.” It consists of an approach that involves the discovery, reporting, prioritization and response to the vulnerabilities that are detected. A solid work platform will ensure that each process and subprocess improves information security in general, and reduces the exposure surface for these vulnerabilities to compromise the integrity of the network. You can access the course here .


Fundamentals of mobile malware analysis – Cybrary

This is a course that already requires a little more skills as a prerequisite, because of the practice labs that are taught. It is highly recommended to have programming skills in languages such as C, Java, Swift and Objective C.

In addition to knowing the architecture of Android and iOS mobile operating systems, you will learn to perform malware analysis of devices that can become high-quality technical reports. You can access the course here .


Windows Forensics and its tools – Cybrary

This course focuses on a set of software / tools that are used to obtain or process information in Windows. Contrary to what many may assume, it is not too easy to learn. However, it is extremely challenging. Why? Windows Forensics contains several features not yet documented, in addition to not easily allowing access to the physical layers of several devices.

Some of the topics covered by the course are: system logs, Windows Prefetch, restore points and relevant system files. You can access the course here .