IoT device security courses can help you learn about threat modeling, vulnerability assessment, secure coding practices, and encryption techniques. You can build skills in risk management, incident response, and implementing security protocols across various devices. Many courses introduce tools like Wireshark for network analysis, Nessus for vulnerability scanning, and various encryption libraries, showing how these tools can be applied to enhance the security of IoT systems and protect against potential breaches.

Skills you'll gain: Computer Security Incident Management, Incident Response, Incident Management, Vulnerability Management, Risk Management Framework, Security Management, Threat Management, Risk Management, Disaster Recovery, Vulnerability Assessments, Information Systems Security, Information Assurance, Cyber Security Policies, Security Controls
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Testing, Vulnerability Scanning, Secure Coding, Data Security, Application Security, Cyber Security Assessment, Vulnerability Assessments, Web Applications, Web Servers, Information Privacy, SQL
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Identity and Access Management, AWS Identity and Access Management (IAM), Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, Azure Active Directory, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Threat Detection, Cryptography, Risk Management, Remote Access Systems
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cloud Security, Threat Detection, Google Cloud Platform, Threat Management, Cloud Computing, Intrusion Detection and Prevention, Network Security, Firewall, Security Information and Event Management (SIEM), Incident Response, Endpoint Security
Advanced · Project · Less Than 2 Hours

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Data Integrity, Data Management, Personally Identifiable Information, Cloud Storage, Data Encryption Standard, Security Controls, Authorization (Computing)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Data Ethics, Generative AI, AWS SageMaker, Cloud Security, MLOps (Machine Learning Operations), Data Security, Role-Based Access Control (RBAC), Data Governance, Artificial Intelligence, Encryption, Public Cloud, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Kubernetes, Cloud-Native Computing, Google Cloud Platform, YAML, Containerization, Application Deployment, Configuration Management, MongoDB, Infrastructure Security, Network Security, Data Storage, Scalability
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Firewall, Network Security, System Configuration, Network Administration, Amazon Web Services, Virtual Private Networks (VPN), Infrastructure Security, Network Monitoring, Network Troubleshooting, Security Information and Event Management (SIEM), Threat Management, Network Performance Management, Endpoint Security, Intrusion Detection and Prevention, System Monitoring, Cyber Security Policies, Configuration Management, Application Deployment
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Security, OSI Models, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, TCP/IP, Network Administration, Wireless Networks, Network Protocols, General Networking, Intrusion Detection and Prevention, Local Area Networks, Network Routers, Security Controls, Mobile Security, Authentications, Authorization (Computing)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Remote Access Systems, User Accounts, Authorization (Computing), Network Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Kubernetes, Threat Management, Cloud-Native Computing, Public Key Infrastructure, Infrastructure Security, Threat Detection, Application Security, Cloud Security, Vulnerability Assessments, Cloud Applications
Intermediate · Course · 1 - 4 Weeks