IoT device security courses can help you learn about threat modeling, vulnerability assessment, secure coding practices, and encryption techniques. You can build skills in risk management, incident response, and implementing security protocols across various devices. Many courses introduce tools like Wireshark for network analysis, Nessus for vulnerability scanning, and various encryption libraries, showing how these tools can be applied to enhance the security of IoT systems and protect against potential breaches.

Skills you'll gain: Blockchain, Threat Modeling, Cryptography, Security Testing, Security Engineering, Threat Management, Cybersecurity, Network Security, Data Security, Vulnerability Assessments, Threat Detection, Information Systems Security, Cyber Security Strategy, Key Management, Encryption, Network Protocols, Regulatory Compliance, Scripting, Financial Regulation, Scalability
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Cyber Risk, Vulnerability Management, Incident Response, Network Architecture
Intermediate · Course · 1 - 4 Weeks

Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Cloud Security, Amazon Web Services, Cloud Management, Cyber Governance, Security Controls, Amazon CloudWatch, Data Governance, Governance, Governance Risk Management and Compliance, Compliance Management, Multi-Tenant Cloud Environments, Continuous Monitoring, Risk Control, Account Management, Threat Detection, Automation, Configuration Management, Budget Management
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Data Lakes, Cloud Storage, Data Security, Data Access, Role-Based Access Control (RBAC), Cloud Computing, Big Data, Data Analysis
Beginner · Project · Less Than 2 Hours

University of Colorado System
Skills you'll gain: Computer Security, OSI Models, Systems Administration, Virtualization, Operating System Administration, Network Security, Information Technology, Information Systems Security, Enterprise Security, General Networking, Cybersecurity, Computer Networking, Virtual Machines, Enterprise Architecture
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, Enterprise Application Management, OSI Models, User Accounts, Group Policy, Security Management, Operating System Administration, Systems Administration, Virtualization, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, DevOps, Vulnerability Scanning
Advanced · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Windows Servers, Authorization (Computing), Microsoft Windows, Authentications, Operating System Administration, User Accounts, Group Policy, Microsoft Servers, Security Controls, Enterprise Security, Active Directory, Identity and Access Management, Servers, Computer Security, System Configuration, Encryption
Beginner · Course · 1 - 3 Months
University of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, Computer Networking, Encryption, Network Infrastructure, Innovation, Hypertext Markup Language (HTML)
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques
Intermediate · Specialization · 3 - 6 Months

Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
Beginner · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Mobile Security, Anomaly Detection, Criminal Investigation and Forensics, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Investigation, Cyber Attacks, File Systems, Intrusion Detection and Prevention, Fraud detection, Mobile Development, Cybersecurity, Applied Machine Learning, Malware Protection, Cyber Security Policies, Apple iOS, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Data Security
Intermediate · Specialization · 3 - 6 Months