IoT device security courses can help you learn about threat modeling, vulnerability assessment, secure coding practices, and encryption techniques. You can build skills in risk management, incident response, and implementing security protocols across various devices. Many courses introduce tools like Wireshark for network analysis, Nessus for vulnerability scanning, and various encryption libraries, showing how these tools can be applied to enhance the security of IoT systems and protect against potential breaches.

Skills you'll gain: Computer Hardware, Virtualization, Cloud Computing, General Networking, Virtual Machines, Hardware Troubleshooting, Networking Hardware, Network Troubleshooting, Network Protocols, TCP/IP, Mobile Security, Dynamic Host Configuration Protocol (DHCP), Wireless Networks, Peripheral Devices, System Configuration, Data Storage Technologies
Beginner · Course · 1 - 3 Months
University of Alberta
Skills you'll gain: Sprint Retrospectives, Scrum (Software Development), Software Technical Review, Agile Project Management, Agile Software Development, Software Quality Assurance, Agile Methodology, User Story, Sprint Planning, Requirements Analysis, User Research
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Data Security, Data Migration, Data Governance, Extract, Transform, Load, Cloud Storage, Data Architecture, Data Management, Data Integration, Data Storage, Enterprise Architecture, Data Quality, Personally Identifiable Information, Data Modeling, Incident Response, Security Controls, Information Privacy, Data Infrastructure, Data Warehousing, Threat Detection, Law, Regulation, and Compliance
Advanced · Specialization · 1 - 3 Months

Skills you'll gain: Networking Hardware, Network Monitoring, OSI Models, Routing Protocols, Software-Defined Networking, Network Troubleshooting, Network Architecture, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Network Security, TCP/IP, Network Routing, Computer Networking, Open Shortest Path First (OSPF), Dynamic Host Configuration Protocol (DHCP), Network Administration, Network Performance Management, Local Area Networks, Hardening, Intrusion Detection and Prevention
Intermediate · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: AI Security, Cybersecurity, Cyber Attacks, Fraud detection, Email Security, Threat Detection, Jupyter, Authentications, Intrusion Detection and Prevention, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Anomaly Detection, Natural Language Processing, Machine Learning, Supervised Learning
Intermediate · Course · 1 - 4 Weeks

MathWorks
Skills you'll gain: Model Based Systems Engineering, Systems Engineering, Systems Architecture, Functional Design, System Design and Implementation, Requirements Analysis, Requirements Elicitation, Verification And Validation
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Threat Management, Cyber Governance, Security Awareness
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Contingency Planning, Disaster Recovery, Business Continuity Planning, Security Management, IT Management, System Monitoring, Cyber Security Policies, Enterprise Security, Compliance Auditing, Security Strategy, Systems Administration, Operating System Administration, Governance, Security Controls, Organizational Strategy, Patch Management, Continuous Monitoring, Unix, Procedure Development, Incident Response
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Data Management, Data Collection, Data Governance, Data Analysis, Information Privacy, Data Quality, Data Storage, Data Security, Data-Driven Decision-Making, Data Architecture, Data Visualization Software, Big Data, Machine Learning
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Software Design, Software Development Life Cycle, Application Security, Technical Design, Software Architecture, Software Development Methodologies, Conceptual Design, Requirements Analysis
Mixed · Course · 1 - 3 Months

Skills you'll gain: Digital Forensics, Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Risk Management, Cryptography, Cybersecurity, Cloud Computing Architecture, Network Security, Incident Response, Threat Management, Cloud Security, Threat Modeling, Risk Analysis, Business Risk Management, Encryption, Cyber Security Policies, Identity and Access Management, Secure Coding, Cyber Threat Intelligence
Intermediate · Specialization · 3 - 6 Months

University of Virginia
Skills you'll gain: Artificial Intelligence, Economics, Economic Development, AI Security, Automation
Advanced · Course · 1 - 3 Months