Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.
Google Cloud
Skills you'll gain: Gmail, Google Workspace, Email Security, Email Automation, Productivity, Productivity Software, Organizational Skills, Business Communication
Beginner · Course · 1 - 3 Months

Skills you'll gain: Azure Active Directory, Authentications, Authorization (Computing), Microsoft Azure, Identity and Access Management, Active Directory, User Provisioning, Role-Based Access Control (RBAC), Single Sign-On (SSO), User Accounts, Cloud Security, Security Engineering, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Cisco Learning and Certifications
Skills you'll gain: Ansible, Development Environment, Postman API Platform, Restful API, Authentications, YAML, Software Development Methodologies, Software-Defined Networking, CI/CD, DevOps, IT Automation, Network Engineering, Network Architecture, Network Administration, Application Programming Interface (API), Scripting, JSON, Data Modeling, Version Control, Network Protocols
Beginner · Specialization · 3 - 6 Months

Vanderbilt University
Skills you'll gain: SQL, Generative AI, Data Visualization, Database Design, Interactive Data Visualization, Query Languages, Data Capture, Data Analysis, Debugging, ChatGPT, Prompt Engineering, Databases, Data Validation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Databricks, CI/CD, Microsoft Azure, Data Architecture, Integration Testing, Data Pipelines, Data Integration, Data Security, Automation, Data Storage, Development Testing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Mobile Security, Operating System Administration, Microsoft Windows, Malware Protection, Information Technology Operations, Disaster Recovery, Mac OS, Document Management, Command-Line Interface, Incident Response, Network Security, Computer Security Incident Management, Linux, Information Systems Security, Security Controls, Information Technology, Windows PowerShell, Problem Management, Operating Systems, Internet Of Things
Intermediate · Specialization · 1 - 4 Weeks
Skills you'll gain: OS Process Management, Operating Systems, C (Programming Language), System Programming, Virtualization, Virtual Machines, Application Programming Interface (API)
Intermediate · Course · 1 - 4 Weeks
Blue Prism
Skills you'll gain: Robotic Process Automation, Business Objects Framework, Business Process Automation, Process Flow Diagrams, Automation, Workflow Management, Process Analysis, Process Development, Business Process, Process Validation, Release Management, Consolidation, Data Import/Export, Data Analysis
Beginner · Course · 1 - 3 Months
Starweaver
Skills you'll gain: Endpoint Detection and Response, Threat Detection, MITRE ATT&CK Framework, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Modeling, Security Information and Event Management (SIEM), Cyber Security Strategy, Cybersecurity, Malware Protection, Data Loss Prevention, Cyber Attacks, Data Security, Encryption, System Implementation, Open Source Technology
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Docker (Software), Security Information and Event Management (SIEM), Software Installation, Microsoft Windows, Event Monitoring, System Configuration, Cloud Computing, Data Security
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Application Security, System Programming, Secure Coding, C++ (Programming Language), C (Programming Language), Debugging, Interoperability, File I/O, Data Validation
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Brute-force attacks, Cryptography, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Data Import/Export, MySQL, Encryption, Mobile Security, Linux, Linux Administration
Beginner · Specialization · 3 - 6 Months