Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Skills you'll gain: Kubernetes, DevSecOps, Infrastructure Security, Vulnerability Scanning, CI/CD, Containerization, Vulnerability Management, Security Controls, Docker (Software), Image Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Digital Forensics, Business Continuity Planning, Disaster Recovery, Computer Security Incident Management, Resource Management, Prioritization, Risk Analysis, Business Analysis, Data Storage Technologies, Law, Regulation, and Compliance, Ethical Standards And Conduct
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Simple Object Access Protocol (SOAP), TCP/IP, Restful API, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cloud Management, Data Centers, Security Management, Risk Management Framework, Identity and Access Management, Data Storage Technologies
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Firewall, Zero Trust Network Access, Linux Administration, Network Security, Security Strategy, Remote Access Systems, Linux, Security Controls, Unix, Ubuntu, Systems Administration, System Configuration
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Vulnerability Management, Cyber Threat Hunting, Vulnerability Assessments, Cloud Security, Multi-Cloud, Intrusion Detection and Prevention, Threat Management, Google Cloud Platform, Enterprise Security, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Data Centers, DevSecOps, System Monitoring, Threat Detection, Infrastructure Security, Microsoft Servers, Security Management, Payment Card Industry (PCI) Data Security Standards, Information Systems Security, Windows Servers, IT Infrastructure, Security Information and Event Management (SIEM), Disaster Recovery, IT Automation, Virtual Machines, Configuration Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: General Data Protection Regulation (GDPR), Information Privacy, Personally Identifiable Information, Data Security, Data Governance, Data Ethics, Data Integrity, Vulnerability Assessments, Law, Regulation, and Compliance, Big Data, Cryptography
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Kubernetes, OAuth, Role-Based Access Control (RBAC), Application Security, Cloud Storage, Authorization (Computing), Data Security, Vulnerability Scanning, Data Encryption Standard, Key Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Brute-force attacks, Web Scraping
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Identity and Access Management, Cloud Security, Authentications, Single Sign-On (SSO), Google Cloud Platform, Threat Management, Security Controls, Authorization (Computing), Cloud Computing, Role-Based Access Control (RBAC), Threat Detection, Cloud Services, Data Security, Network Security, Firewall, Virtual Private Networks (VPN), User Accounts, Virtual Networking, Encryption, Load Balancing
Intermediate · Course · 1 - 3 Months