Cybersecurity courses can help you learn network security, risk management, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability assessment, and implementing security protocols to protect sensitive information. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, showing how these tools support the skills needed to safeguard digital environments.

Coursera
Skills you'll gain: Bash (Scripting Language), Shell Script, Unix Shell, Scripting, Linux Commands, Unix Commands, Scripting Languages, Command-Line Interface, Linux, File Management, Unix, File Systems, Systems Administration
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Human Factors (Security), Information Systems Security, Data Persistence
Intermediate · Course · 1 - 3 Months

Packt
Skills you'll gain: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, MITRE ATT&CK Framework, Systems Development Life Cycle, Cyber Governance, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Attacks, Network Infrastructure
Intermediate · Specialization · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Vulnerability Scanning, Cyber Security Assessment, Security Testing, Cybersecurity, Cyber Threat Intelligence, Cyber Threat Hunting, Cyber Operations, Cyber Security Strategy, Cyber Attacks, Exploitation techniques, Problem Solving
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Operations, Cybersecurity, Interactive Data Visualization, Geospatial Information and Technology, IT Automation, Data Security, Security Awareness, Scripting, Network Analysis, Open Source Technology, Information Privacy
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cybersecurity, Cryptography, Cryptographic Protocols, Exploitation techniques, Security Testing, Encryption, Technical Writing, Test Tools, Human Factors (Security), Technical Communication
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Cyber Security Strategy, Security Testing, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Linux, Linux Administration
Beginner · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Calculus, Integral Calculus, Applied Mathematics, Plot (Graphics), Graphing, Numerical Analysis, Python Programming, Mathematical Software, Software Visualization, Algebra, Derivatives, Computer Programming
Intermediate · Course · 1 - 3 Months
University of Illinois Urbana-Champaign
Skills you'll gain: Data Governance, Accounting, Data Management, Internal Controls, Internal Auditing, Control Objectives for Information and Related Technology (COBIT), Auditing, General Accounting, Financial Auditing, Fraud detection, Data Quality, Data Integrity, Exploratory Data Analysis, Data Manipulation, Pandas (Python Package), Data Analysis, Analytics, GitHub, Python Programming, Natural Language Processing
Build toward a degree
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Enterprise Risk Management (ERM), Continuous Monitoring, Medical Privacy, Personally Identifiable Information, Risk Management, Cyber Security Strategy, Risk Management Framework, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management, Governance Risk Management and Compliance, Health Technology, Information Privacy, Health Care Procedure and Regulation, Risk Mitigation, Healthcare Industry Knowledge, Risk Control, Data Management, Patient Safety, Security Awareness, Data Security
Beginner · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Model Evaluation, Incident Response, Threat Detection, Computer Security Incident Management, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Incident Management, Threat Management, Model Training, Continuous Monitoring, Cyber Security Policies, System Monitoring, AI Security, Virtual Machines, Network Security, Machine Learning Methods, Network Analysis, Data Analysis
Intermediate · Specialization · 3 - 6 Months

Pearson
Skills you'll gain: Open Web Application Security Project (OWASP), AI Security, Vulnerability Assessments, Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Web Applications, Internet Of Things, Cloud Computing, Network Architecture
Intermediate · Specialization · 1 - 3 Months