IoT device security courses can help you learn about threat modeling, vulnerability assessment, secure coding practices, and encryption techniques. You can build skills in risk management, incident response, and implementing security protocols across various devices. Many courses introduce tools like Wireshark for network analysis, Nessus for vulnerability scanning, and various encryption libraries, showing how these tools can be applied to enhance the security of IoT systems and protect against potential breaches.

Skills you'll gain: MITRE ATT&CK Framework, Cybersecurity, Cyber Threat Intelligence, Cyber Operations, IT Automation, Scripting, Python Programming
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption, Data Manipulation
Beginner · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Security Management, Data Management, Security Controls
Beginner · Specialization · 1 - 3 Months

Infosec
Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Threat Management, Cyber Governance, Security Awareness
Mixed · Course · 1 - 4 Weeks

Fractal Analytics
Skills you'll gain: Prompt Engineering, Responsible AI, Generative AI, Data Ethics, AI Security, Management Consulting, Artificial Intelligence, Business Consulting, Consulting, Technical Consulting, AI Enablement, Microsoft Copilot, Quality Assurance, Market Research, Large Language Modeling, Data-Driven Decision-Making, Automation, Technical Communication, Critical Thinking, Problem Solving
Beginner · Specialization · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Exploitation techniques, Security Controls, Software Design, Verification And Validation, Java, Code Review, Programming Principles, Debugging, Cybersecurity
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Intrusion Detection and Prevention, Continuous Monitoring, Threat Management, Firewall, Incident Response, Network Security, Threat Detection, Network Monitoring, Information Systems Security, Infrastructure Security, Cybersecurity
Advanced · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Microsoft 365, Microsoft Office, Collaborative Software, Microsoft Teams, Productivity Software, Endpoint Security, Microsoft Windows, Automation, Microsoft Outlook, Data Loss Prevention, Data Security, Microsoft Word, Microsoft PowerPoint, Microsoft Excel
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Remote Access Systems, Linux, Web Applications, Internet Of Things, Embedded Systems, Application Programming Interface (API), Robotics, Linux Commands, Command-Line Interface, Electronics, Control Systems, Electronic Systems, System Configuration, Python Programming, Hardware Troubleshooting, Software Installation, Peripheral Devices
Mixed · Course · 1 - 4 Weeks

The State University of New York
Skills you'll gain: Diplomacy, International Relations, Health Policy, Governance, Health Systems, Public Health and Disease Prevention, Public Health, International Finance, Policty Analysis, Research, and Development, Health Care, Public Safety and National Security, Philanthropy, Advocacy, Economic Development, Case Studies
Beginner · Course · 1 - 3 Months

Royal Holloway, University of London
Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Security Awareness, Social Sciences, Exploitation techniques, Culture, Psychology, Survey Creation, Research
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Data Ethics, Data Visualization Software, Interactive Data Visualization, Visualization (Computer Graphics), Data Security, Data Presentation, User Centered Design, User Experience Design, Technical Communication, Cybersecurity, Healthcare Ethics, Usability, Statistical Reporting, Human Centered Design, Authentications, Data Storytelling, Ethical Standards And Conduct, Information Privacy, Responsible AI, Analysis
Build toward a degree
Intermediate · Specialization · 3 - 6 Months