Data privacy and security courses can help you learn data protection regulations, risk assessment techniques, incident response strategies, and encryption methods. You can build skills in analyzing vulnerabilities, implementing security measures, and ensuring compliance with laws like GDPR and CCPA. Many courses introduce tools such as firewalls, intrusion detection systems, and data loss prevention software, demonstrating how these skills are applied to safeguard sensitive information and maintain organizational integrity.

Skills you'll gain: Vulnerability Scanning, Microsoft Azure, Vulnerability Assessments, Cloud Security, Continuous Monitoring, Key Management, System Monitoring, Security Controls, Security Information and Event Management (SIEM), Incident Response, Security Management, Hybrid Cloud Computing, Multi-Cloud, Incident Management, Automation
Intermediate · Course · 1 - 4 Weeks

University of California San Diego
Skills you'll gain: Unit Testing, Data Structures, Java, JUnit, Performance Tuning, Debugging, Algorithms, Object Oriented Programming (OOP), Theoretical Computer Science, Unstructured Data
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Disaster Recovery, System Monitoring, Kubernetes, DevSecOps, DevOps, Continuous Monitoring, Application Security, Hardening, Key Management, Encryption, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Teams, Data Loss Prevention, Data Governance, Compliance Management, Role-Based Access Control (RBAC), Collaborative Software, Windows PowerShell, Security Management, Identity and Access Management, System Monitoring, System Configuration, Event Monitoring, Legal Technology
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: User Provisioning, Azure Active Directory, Cloud Security, Security Information and Event Management (SIEM), Identity and Access Management, Role-Based Access Control (RBAC), Security Controls, Multi-Factor Authentication, Authorization (Computing), Authentications, Continuous Monitoring, Threat Detection, Incident Response, General Data Protection Regulation (GDPR), Automation
Intermediate · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Work Breakdown Structure, Project Planning, Project Management, Planning, Leadership
Mixed · Course · 1 - 3 Months

Yonsei University
Skills you'll gain: Spatial Data Analysis, Spatial Analysis, Geographic Information Systems, Geospatial Mapping, Database Management Systems, Big Data, Apache Hadoop, PostgreSQL, Network Analysis
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Probability, Statistical Inference, Estimation, Probability & Statistics, Probability Distribution, Statistical Methods, Statistics, Markov Model, Bayesian Statistics, Data Literacy, Statistical Analysis, Sampling (Statistics), Applied Mathematics, Artificial Intelligence, Generative AI, Data Analysis, Data Science, Theoretical Computer Science, Machine Learning Algorithms, Mathematical Theory & Analysis
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Google Cloud
Skills you'll gain: Cyber Operations, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Threat Management, DevOps, Security Engineering, Threat Detection, Cyber Security Assessment, Incident Response, Site Reliability Engineering, Digital Transformation, Agile Methodology, Automation, Critical Thinking
Beginner · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Threat Modeling, Identity and Access Management
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: Endpoint Security, Infrastructure Security, Security Management, Network Security, Cyber Security Policies, Security Controls, Data Security, Security Strategy, Application Security, IT Infrastructure, Information Management, Enterprise Security, Data Integrity
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Exploitation techniques, Threat Detection
Beginner · Course · 1 - 3 Months