Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Cryptographic Protocols, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Security Management, Vulnerability Assessments, Risk Management, Network Security, Application Security, Asset Management, Cloud Security, OSI Models
★ 4.7 (302) · Beginner · Specialization · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, File Management, Data Lakes, Cloud Storage, Data Security, Cloud Management, Data Access, Role-Based Access Control (RBAC), Authorization (Computing), User Provisioning, Cloud Computing, Big Data, Data Analysis
Beginner · Project · Less Than 2 Hours
University of Michigan
Skills you'll gain: Network Security, Network Administration, Network Protocols, Network Architecture, TCP/IP, Cryptographic Protocols, General Networking, Cryptography, Computer Networking, Encryption, Web Development, Network Routing, Innovation
★ 4.8 (2.8K) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Data Centers, Network Security, Network Administration, Virtualization and Virtual Machines, Network Troubleshooting, Virtual Machines, Network Monitoring, Wide Area Networks, Virtualization, Wireless Networks, Firewall, Event Monitoring, Cloud Infrastructure, Hardening, IT Security Architecture, Virtual Private Networks (VPN), Network Infrastructure, TCP/IP, Cloud Computing, Information Technology Operations
★ 4.9 (11) · Advanced · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Data Security, Security Testing, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Cyber Risk, Cyber Security Strategy, AI Integrations, Intrusion Detection and Prevention, Cyber Threat Hunting, Data Management, Cybersecurity, Cyber Governance, Artificial Intelligence and Machine Learning (AI/ML), Security Management, Security Awareness, Security Strategy, AI Product Strategy, Security Software, Generative AI
★ 4.6 (40) · Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Contingency Planning, Business Continuity Planning, Computer Security Incident Management, Security Management, Incident Response, Disaster Recovery, Data Centers, Incident Management, Security Controls, Cybersecurity, Infrastructure Security, Configuration Management, Change Control, Digital Forensics, Scenario Testing
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Governance Risk Management and Compliance, Cyber Attacks, Identity and Access Management, Cybersecurity, Cyber Security Strategy, Information Systems Security, AI Security, Cyber Governance, Security Management, Cloud Security, Security Information and Event Management (SIEM), Cyber Security Assessment, Cyber Risk, Security Software, Zero Trust Network Access, Endpoint Security, Human Factors (Security), Risk Management, Data Governance, Artificial Intelligence and Machine Learning (AI/ML)
Beginner · Specialization · 1 - 3 Months

Pearson
Skills you'll gain: File Management, Firewall, Linux Administration, Ubuntu, Hardening, File Systems, OS Process Management, Linux, Authentications, Zero Trust Network Access, Linux Servers, Remote Access Systems, Data Security, Authorization (Computing), User Accounts, Network Security, Linux Commands, User Provisioning, Operating System Administration, IT Security Architecture
★ 4.5 (6) · Intermediate · Specialization · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Blockchain, Security Controls, Cybersecurity, Data Security, Network Security, Security Architecture Review, Cryptography, IT Security Architecture, Vulnerability Assessments, Cryptographic Protocols, Encryption, Key Management, Risk Management, Public Key Cryptography Standards (PKCS), Data Integrity
★ 4.8 (13) · Intermediate · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Cloud Security, Identity and Access Management, AWS Identity and Access Management (IAM), Incident Response, Cloud Computing, Cloud Applications, Computer Security Incident Management, Cloud Standards, Cloud Platforms, IT Security Architecture, Data Security, Application Security, Network Security, Encryption, Cloud Deployment, Incident Management, Role-Based Access Control (RBAC), Amazon Web Services, Security Management, Authorization (Computing)
Beginner · Course · 1 - 3 Months

Skills you'll gain: Hardware Architecture, OSI Models, Computer Networking, Computer Hardware, Disaster Recovery, Virtual Local Area Network (VLAN), Network Administration, Network Architecture, Network Infrastructure, Database Management, General Networking, Network Troubleshooting, Relational Databases, Computer Systems, Wide Area Networks, Databases, Hardware Troubleshooting, Computer Architecture, Networking Hardware, IT Service Management
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Cryptographic Protocols, Network Security, Encryption, OSI Models, Cryptography, IT Security Architecture, Network Performance Management, Network Architecture, Computer Networking, General Networking, Communication Systems, Remote Access Systems, TCP/IP, Network Infrastructure, Network Protocols, Wireless Networks, Virtual Private Networks (VPN), Virtual Networking, Endpoint Security, Cloud Security
★ 4.7 (11) · Intermediate · Course · 1 - 4 Weeks