Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Google Cloud
Skills you'll gain: Google Gemini, Retrieval-Augmented Generation, Generative AI, AI Enablement, Gemini, Enterprise Security, Customer experience improvement, Artificial Intelligence, LLM Application, Cloud Infrastructure, Cloud Computing, Tool Calling, Organizational Strategy, Innovation, Data Governance, Collaboration
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Microsoft Power Platform, Microsoft Power Automate/Flow, Power BI, Dashboard, No-Code Development, Data Visualization, Data Integration, Interactive Data Visualization, Microsoft 365, Business Intelligence, Business Process Automation, Application Development, Data Analysis, Performance Analysis, Generative AI Agents, Application Design, Automation, Data Security, Data Store, Computing Platforms
Beginner · Specialization · 1 - 3 Months

University of Minnesota
Skills you'll gain: Business Systems Analysis, Systems Analysis, Requirements Analysis, Business Requirements, Business Analysis, Business Systems, Process Flow Diagrams, User Requirements Documents, Data Flow Diagrams (DFDs), Requirements Management, Diagram Design, Feasibility Studies
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Intelligence, Vulnerability Assessments, Incident Response, Cybersecurity, Threat Modeling, Cyber Threat Hunting, Threat Detection, Application Security, Security Management, Intrusion Detection and Prevention, Security Controls, Malware Protection, Network Analysis
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Threat Modeling, IT Security Architecture, Network Security, Internet Of Things, Threat Detection, Cloud Security, Security Engineering, Infrastructure Security, Vulnerability Management, Identity and Access Management, Information Systems Security, Encryption, Incident Response, Threat Management, Cybersecurity, Security Strategy, Security Controls, Penetration Testing, Vulnerability Assessments, Cloud Solutions
Intermediate · Specialization · 1 - 3 Months

Fractal Analytics
Skills you'll gain: Cloud Computing, Information Technology, Cybersecurity, Machine Learning Algorithms, Critical Thinking, Simulations
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: General Data Protection Regulation (GDPR), Personally Identifiable Information, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Data Ethics, Cyber Governance, Security Controls, Cyber Risk, Data Access, Encryption, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Bash (Scripting Language), Test Automation, Unit Testing, Scripting, Software Testing, Linux Commands, Test Driven Development (TDD), Unix Commands, Development Environment, Operating Systems, Command-Line Interface, File Management, OS Process Management, File Systems, Automation, Python Programming
Beginner · Course · 1 - 3 Months

Institut Mines-Télécom
Skills you'll gain: Network Engineering, Wireless Networks, Network Security, Network Architecture, Computer Networking, Network Infrastructure, Mobile Security, Network Protocols, Telecommunications, Network Performance Management, Network Routing, Digital Communications, Dataflow, Encryption
Intermediate · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Microsoft Word, Microsoft 365, Collaborative Software, Microsoft Office, Productivity Software, Document Management, Technical Documentation, Microsoft Windows, Writing, Editing, Computer Literacy, Web Content Accessibility Guidelines, Peer Review
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Security Testing, Brute-force attacks, Vulnerability Scanning, Network Security, Operating Systems, Encryption
Intermediate · Specialization · 3 - 6 Months

Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Threat Management, Exploit development, Computer Security Incident Management, Network Analysis, Cybersecurity, Network Security, Network Monitoring, SQL
Mixed · Course · 1 - 4 Weeks