Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Cyber Governance, Security Management, NIST 800-53, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Legal Risk
Beginner · Specialization · 3 - 6 Months
Skills you'll gain: Application Security, Angular, OAuth, Test Driven Development (TDD), Cryptography, Web Components, Data Validation, Vue.JS, Data Security, Authentications, HTML and CSS, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Web Development, Web Applications, JavaScript Frameworks, Javascript, Security Strategy, Computer Programming
Beginner · Specialization · 1 - 3 Months

Macquarie University
Skills you'll gain: Digital Forensics, Criminal Investigation and Forensics, Investigation, File Systems, Mobile Security, Cybersecurity, Data Security, Data Integrity, Malware Protection, File Management, Computer Security Incident Management, Incident Response, Data Storage, Real Time Data, Disaster Recovery, Linux, Network Analysis, Regulation and Legal Compliance
Beginner · Course · 1 - 3 Months

Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Security Software, Computer Security Awareness Training, Information Systems Security, Security Strategy, Incident Response, Data Storage, Vulnerability Assessments, Patch Management
Mixed · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Data Storage Technologies, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Authentications, Hardware Architecture, Emerging Technologies
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, Operating System Administration, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Authorization (Computing), Computer Security, Network Administration, Authentications
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Information Privacy, Responsible AI, Personally Identifiable Information, Data Security, Data Ethics, General Data Protection Regulation (GDPR), Data Governance, Data Management, Incident Response, Cyber Security Policies, Compliance Management, Cyber Security Strategy, Artificial Intelligence, Data Science, Cybersecurity, Risk Analysis, Accountability, Stakeholder Engagement, Cyber Operations, Algorithms
Beginner · Course · 1 - 3 Months

University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, TCP/IP, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Network Security, Threat Management, Vulnerability Management, Intrusion Detection and Prevention, Hardening, Computer Security Incident Management, Security Management, Cyber Threat Intelligence, Cyber Attacks, Incident Response, Cybersecurity, Network Protocols, Threat Detection, Bash (Scripting Language), Debugging, Linux, Interviewing Skills, Python Programming, SQL
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, Network Analysis, TCP/IP, Network Protocols, Cybersecurity, Application Security, Vulnerability Scanning, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Web Applications, Javascript, Web Development, Node.JS, Security Controls, Web Servers, Hypertext Markup Language (HTML), Java Programming
Intermediate · Course · 1 - 4 Weeks