Data security courses can help you learn encryption techniques, risk assessment strategies, incident response planning, and compliance regulations. You can build skills in vulnerability management, threat detection, and secure coding practices. Many courses introduce tools like firewalls, intrusion detection systems, and data loss prevention software, demonstrating how these skills are applied to protect sensitive information and maintain system integrity.

Coursera
Skills you'll gain: Predictive Modeling, Data Visualization, Predictive Analytics, Statistical Analysis, Data Manipulation, Data Analysis, Data Science, Statistical Methods, Pandas (Python Package), Data Wrangling, Data Cleansing, Data Preprocessing, Data-Driven Decision-Making, Business Analytics, Exploratory Data Analysis, Model Evaluation, Machine Learning, Machine Learning Algorithms
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Role-Based Access Control (RBAC), Authorization (Computing), User Accounts, Cloud Security, Data Security, Cloud Platforms, Command-Line Interface
Intermediate · Guided Project · Less Than 2 Hours

Coursera
Skills you'll gain: Correlation Analysis, Probability & Statistics, Statistics, Statistical Analysis, Data Analysis, Data Science, Probability Distribution, Descriptive Statistics, Statistical Inference
Beginner · Guided Project · Less Than 2 Hours

Coursera
Skills you'll gain: Plotly, Exploratory Data Analysis, Scatter Plots, Plot (Graphics), Data Visualization, Data Visualization Software, Interactive Data Visualization, Python Programming
Intermediate · Guided Project · Less Than 2 Hours

Mixed · Course

Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Identity and Access Management, Kubernetes, OAuth, Encryption, Cloud API, Application Security, Authorization (Computing), Data Encryption Standard, Cloud Storage, Authentications, Data Security, Application Programming Interface (API), Virtual Machines, Vulnerability Scanning, Key Management
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Secure Coding, Artificial Intelligence, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Data Ethics, Authentications
Build toward a degree
Advanced · Course · 1 - 4 Weeks
University of Washington
Skills you'll gain: Data Ethics, Statistical Visualization, Data Storytelling, Data Visualization Software, Data Governance, Big Data, Technical Communication, Cloud Computing, Amazon Web Services, Information Privacy, Ethical Standards And Conduct
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Vulnerability Management, Cyber Threat Hunting, Vulnerability Assessments, Cloud Security, Multi-Cloud, Intrusion Detection and Prevention, Threat Management, Google Cloud Platform, Enterprise Security, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

Northeastern University
Skills you'll gain: Database Design, Database Theory, MongoDB, Database Development, Database Management Systems, Databases, Data Modeling, Database Architecture and Administration, NoSQL, Relational Databases, Unified Modeling Language, SQL, Data Integrity, Performance Tuning, Diagram Design, Software Architecture, Conceptual Design
Mixed · Course · 1 - 4 Weeks

Alberta Machine Intelligence Institute
Skills you'll gain: Feature Engineering, Data Preprocessing, Model Evaluation, Data Quality, Supervised Learning, Data Validation, Data Cleansing, Data Ethics, Applied Machine Learning, Machine Learning, Unsupervised Learning, Machine Learning Algorithms, Python Programming, Computer Programming, Linear Algebra, Statistical Analysis
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Prompt Engineering, Google Cloud Platform, Kubernetes, Identity and Access Management, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Cloud Security, Cloud Infrastructure, Vulnerability Management, Containerization, Cloud Storage, Cloud Services, Virtual Machines, Infrastructure As A Service (IaaS), Vulnerability Assessments, Generative AI Agents, Data Loss Prevention, Cloud Computing, Role-Based Access Control (RBAC), Malware Protection
Intermediate · Specialization · 3 - 6 Months