Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, Vulnerability Scanning, Continuous Deployment
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Containerization, Microservices, Authentications, OAuth, Application Deployment, Integration Testing, Event-Driven Programming, Data Migration, Application Programming Interface (API), Software Architecture, Software Design Patterns, Scalability, Systems Integration
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Controls
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Hardware Architecture, Security Engineering, Internet Of Things, Encryption, Information Systems Security, Vulnerability Assessments, Threat Modeling, Data Security, Security Requirements Analysis, General Data Protection Regulation (GDPR), Personally Identifiable Information, Information Privacy, Authentications, Authorization (Computing)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Command-Line Interface, Network Security, Operating Systems, Information Technology Operations, Mac OS, Microsoft Windows, Information Systems Security, System Configuration, Mobile Security, System Support, Linux, Network Troubleshooting, Technical Support, Software Installation, Help Desk Support, Firewall, Malware Protection, Artificial Intelligence, Encryption
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
Intermediate · Guided Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Data Import/Export, Google Cloud Platform, Data Pipelines, Security Information and Event Management (SIEM), Data Sharing, Cloud Security
Intermediate · Project · Less Than 2 Hours

Skills you'll gain: Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Simple Object Access Protocol (SOAP), TCP/IP, Restful API, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Vulnerability Management, Google Cloud Platform, Infrastructure Security, Threat Detection, Security Controls, Data Security, Continuous Monitoring, Identity and Access Management, Cloud Services
Intermediate · Course · 1 - 3 Months
Skills you'll gain: Vulnerability Assessments, Network Security, Security Engineering, Telecommunications, Infrastructure Security, Cyber Security Assessment, Threat Detection, Network Analysis, Continuous Monitoring, Security Strategy, Internet Of Things, Emerging Technologies, General Networking, Network Architecture, Enterprise Architecture, Infrastructure Architecture, Virtualization
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Attacks, Zero Trust Network Access, Cybersecurity, Network Security, Cloud Deployment, Infrastructure Security, Mobile Security, Security Controls, Disaster Recovery
Intermediate · Course · 1 - 3 Months