Online Cyber Security Courses and Training Program Info

Online courses in cyber security are often included in a degree program in information security or information systems. Standalone options may be available as well.

Online Courses in Cyber Security

The descriptions below are for some typical cyber security-related courses that are available online.

  • Introduction to Personal Computer Security Course: Students in this class examine the fundamental vulnerabilities of various operating systems and software in personal computers and how to fix them. They learn about the creation and use of malicious worms and viruses and how to defend against such attacks. Students learn how to utilize a firewall to protect computer systems.
  • Fundamentals of Information Security Management Course: This course provides a basic overview of information security management in a corporate setting. Students examine introductory topics such as assurance principles, risk management issues, and organizational plans, along with the various types of security tools available. Other relevant issues discussed include ethics, law, and policies.
  • Risk Management in Information Security Course: This cyber security course teaches students the goals of security management and how to assess, model, communicate, and address risks involved in information security. They learn to identify classifications of data and the security levels needed for each, as well as security plans to mitigate trouble spots.
  • Cryptography Course: In this advanced online course, students learn how cryptography applications maintain confidentiality and integrity of data being transferred across network systems. They explore appropriate cryptography plans for different scenarios and how digital signatures, public key infrastructure, and certificate authority aid in secure data transmission.
  • Ethical Hacking Course: This online course encourages students to use common hacking tools and techniques to test their own networks for security holes. This practice, known as ethical or white-hat hacking, teaches students how to better protect their networks from unauthorized access. Topics include learning how to trace interactions between hardware and software and following data packets through a network to identify security breaches and loss of information.
  • Disaster Recovery and Business Continuity Planning Course: Students learn to plan a recovery from unforeseen disaster, such as a cyber attack, including identifying and creating a strategy for critical business operations. Analyzing 'what if?' scenarios is often used as a study tool.
  • Exploiting and Protecting Web Applications Course: Students learn about web application vulnerabilities, how attacks are conducted, and how to prevent attacks from being successful. Featured attack methods include client-state manipulation, SQL injection, DNS rebinding, cookie-based attacks, cross domain attacks, timing attacks, HTTP header injection, and user tracking. Targets for attack include JavaScript, HTML5 extensions, mash-ups, and AJAX.
  • Writing Secure Code Course: In a time when millions of dollars may be invested in the code that makes up the backbone of a company, code security is paramount. This course teaches students how to write secure code as well as how to discover vulnerabilities in existing code.
  • Mobile Security Course: This online class provides an overview of mobile security measures for both iOS and Android applications and operating systems. Prevalent risks and trends in mobile device management will also be covered.

Program Information

Online cyber security courses focus on information security management, business continuity and disaster recovery, corporate network security, ethical hacking, network infrastructure, and cryptology. Courses can be taken as standalone electives or for credit towards a degree or professional certificate program in information technology, cyber security, or computer and information science.

Course schedules may be asynchronous for independent study or follow the school's on-campus schedule, with more interaction among online instructors and students. Students will want to check before enrolling to see if any specialized cyber security software is required.

Whether being taken for a certificate or for an information security or information systems degree program, online options in cyber security classes are readily available. Topics of study may include disaster recovery, mobile security, and ethical hacking.

Next: View Schools

Popular Schools

The listings below may include sponsored content but are popular choices among our users.

Find your perfect school

What is your highest level of education?