Data security courses can help you learn encryption techniques, risk assessment strategies, incident response planning, and compliance regulations. You can build skills in vulnerability management, threat detection, and secure coding practices. Many courses introduce tools like firewalls, intrusion detection systems, and data loss prevention software, demonstrating how these skills are applied to protect sensitive information and maintain system integrity.

PepsiCo
Skills you'll gain: Water Sustainability, Water Resource Management, Water Resources, Hydrology, Water Quality, Stormwater Management, Corporate Sustainability, Stakeholder Engagement, Natural Resource Management, Environment and Resource Management, Supply Chain Management, Economic Development
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, TCP/IP, Network Analysis
Beginner · Course · 1 - 4 Weeks

Fortinet, Inc.
Skills you'll gain: Network Troubleshooting, Firewall, Network Monitoring, Network Security, Virtual Private Networks (VPN), Network Performance Management, Lightweight Directory Access Protocols, System Monitoring, Authentications, Performance Tuning, System Configuration, Cybersecurity, Malware Protection
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Cryptography, Network Security, Encryption, Advanced Encryption Standard (AES), Cybersecurity, Key Management, Security Engineering, Data Integrity, Federated Learning, Security Management
Beginner · Course · 1 - 3 Months

AI CERTs
Skills you'll gain: Threat Modeling, Application Security, Secure Coding, Scalability, Blockchain, Web Development, Program Development, Cryptography, Payment Systems, Transaction Processing, Real Time Data
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Embedded Software, Security Engineering, Application Security, Hardening, Embedded Systems, Infrastructure Security, Information Systems Security, Security Controls, Network Security, Secure Coding, Threat Modeling, Cybersecurity, Encryption, System Configuration, Security Strategy, Federal Information Security Management Act, Linux, Hardware Architecture, Data Storage Technologies, Computer Hardware
Intermediate · Course · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

University of London
Skills you'll gain: Network Security, IT Security Architecture, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Threat Detection
Beginner · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Cybersecurity, Vulnerability Management, Multi-Factor Authentication
Beginner · Course · 1 - 4 Weeks

Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, IT Security Architecture, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
Beginner · Specialization · 3 - 6 Months

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Cloud Deployment, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, System Configuration, Firewall, Cloud Computing Architecture, Linux Administration, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months