Cybersecurity courses can help you learn network security, risk management, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability assessment, and implementing security protocols to protect sensitive information. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, showing how these tools support the skills needed to safeguard digital environments.

Skills you'll gain: Generative AI, Google Cloud Platform, Cybersecurity, Cloud Security, Artificial Intelligence, Technical Communication
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Brute-force attacks, Cyber Operations, Scripting, Cybersecurity, Vulnerability Assessments, Python Programming, Network Analysis, Automation
Mixed · Course · 1 - 4 Weeks

Northeastern University
Skills you'll gain: Health Informatics, Health Information Management, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Care Administration, Digital Transformation, Healthcare Industry Knowledge, Health Care Procedure and Regulation, Emerging Technologies, Information Privacy, Data Management, Technology Strategies, Cybersecurity, Data Security, Platform As A Service (PaaS), Innovation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Configuration Management, Data Ethics, Data Integrity, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Cloud Standards, Cyber Risk, Data Security, Cloud Management, Security Management, ISO/IEC 27001, Information Privacy, Infrastructure as Code (IaC), Cyber Security Policies, Security Controls, Google Cloud Platform
Beginner · Course · 1 - 4 Weeks

Cisco Learning and Certifications
Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Cybersecurity, Network Security, Security Information and Event Management (SIEM), Network Monitoring, Information Assurance, Network Analysis, Intrusion Detection and Prevention, Event Monitoring, Continuous Monitoring, Threat Detection
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Business Continuity Planning, Continuous Monitoring, Security Management, ISO/IEC 27001, Security Controls, Information Systems Security, Risk Management, Risk Analysis, Security Strategy, Cyber Governance, Threat Modeling, NIST 800-53, Compliance Management, Regulatory Requirements
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Cyber Threat Intelligence, Threat Management, Vulnerability Assessments, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Cybersecurity, Security Strategy, Risk Mitigation, Emergency Response, Network Analysis, Technical Writing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Threat Management, Security Management, Cybersecurity, Continuous Monitoring, Scenario Testing, Technical Communication, Simulations
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Bash (Scripting Language), Network Monitoring, Exploit development, System Configuration, Digital Forensics, Virtualization
Intermediate · Course · 1 - 3 Months

Cisco Learning and Certifications
Skills you'll gain: Incident Response, Computer Security Incident Management, Security Information and Event Management (SIEM), Event Monitoring, Threat Detection, General Networking, Network Security, Cybersecurity, Infrastructure Security, Computer Networking, IT Security Architecture, Technical Support and Services, Malware Protection
Mixed · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)
Intermediate · Course · 1 - 3 Months