Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Skills you'll gain: Containerization, Microservices, Authentications, OAuth, Application Deployment, Integration Testing, Event-Driven Programming, Data Migration, Application Programming Interface (API), Software Architecture, Software Design Patterns, Scalability, Systems Integration
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Anomaly Detection, Operations Support Systems, Generative AI Agents, Artificial Intelligence and Machine Learning (AI/ML), Generative AI, Deep Learning, AI Security, Real Time Data, Artificial Intelligence, Telecommunications, Network Performance Management, Emerging Technologies, Responsible AI, Network Architecture, Wireless Networks, Computer Networking, Network Protocols, System Design and Implementation, Digital Communications, Communication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Integrity, Data Integration, Power BI, Data Maintenance, Database Management, Microsoft SQL Servers, Relational Databases, Databases, Application Programming Interface (API), Dashboard, Data Visualization, Interactive Data Visualization, Business Intelligence, Data Security, Systems Integration, Role-Based Access Control (RBAC), Auditing, Real Time Data, Data Encryption Standard
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Data Import/Export, Google Cloud Platform, Data Pipelines, Security Information and Event Management (SIEM), Data Sharing, Cloud Security
Intermediate · Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Cloud Management, Cloud Security, Vulnerability Assessments, Vulnerability Management, Security Management, Security Controls, Google Cloud Platform, Configuration Management
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Simple Object Access Protocol (SOAP), TCP/IP, Restful API, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Open Shortest Path First (OSPF), Virtual Local Area Network (VLAN), Wide Area Networks, Network Security, Threat Detection, Network Administration, TCP/IP, Multiprotocol Label Switching, Computer Networking, Network Routing, Virtual Private Networks (VPN), Network Troubleshooting, Dynamic Host Configuration Protocol (DHCP), Network Switches, Network Protocols
Advanced · Course · 3 - 6 Months

Skills you'll gain: Cyber Security Assessment, Penetration Testing, Cyber Threat Intelligence
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Threat Modeling, Vulnerability Assessments, Cybersecurity, Enterprise Security, Network Security, Regulation and Legal Compliance, Data Security, Secure Coding, Key Management, Application Frameworks, Distributed Denial-Of-Service (DDoS) Attacks, Emerging Technologies, Data Integrity
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Security Controls
Advanced · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Database Management, Apache Hadoop, Query Languages, Big Data, Databases, SQL, Data Access, Distributed Computing, Performance Tuning, Data Processing, Data Integrity, Authorization (Computing), Data Storage Technologies, File Systems, Algorithms
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months