Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Digital Assets, Threat Modeling, Vulnerability Assessments, Cybersecurity, Regulatory Compliance, Enterprise Security, Network Security, Data Security, Law, Regulation, and Compliance, Information Systems Security, Secure Coding, Key Management, Distributed Denial-Of-Service (DDoS) Attacks
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Security Testing, Vulnerability Scanning, Secure Coding, Data Security, Application Security, Cyber Security Assessment, Vulnerability Assessments, Web Applications, Web Servers, Information Privacy, SQL
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Hardware Architecture, Security Engineering, Internet Of Things, Encryption, Information Systems Security, Vulnerability Assessments, Cybersecurity, Threat Modeling, Data Security, Security Requirements Analysis, Vulnerability Management, Information Privacy
Beginner · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Secure Coding, Application Security, C and C++, Verification And Validation, Vulnerability Management, Linux, Security Controls, Vulnerability Assessments, Threat Modeling, Data Validation, Debugging, Cryptography, C (Programming Language), Identity and Access Management, Encryption, File Management, OS Process Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Augmented and Virtual Reality (AR/VR), Virtualization, Cloud Computing Architecture, Virtual Machines, Cloud Computing, Firewall, Network Architecture, Virtual Private Networks (VPN), Mobile Security, Cloud Security, Wireless Networks, Network Protocols, Peripheral Devices
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, Threat Detection, Threat Modeling, Endpoint Detection and Response
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Detection and Response, Cloud Security, Cyber Attacks, Infrastructure Security, Encryption, Cloud Computing, Threat Modeling, Authorization (Computing), Network Architecture, Dynamic Host Configuration Protocol (DHCP), Identity and Access Management, Information Systems Security, Email Security, Human Factors (Security), Network Infrastructure, Network Protocols, Data Security, Security Awareness, Malware Protection, Mobile Security
Intermediate · Specialization · 1 - 3 Months

University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Data Store, Cryptographic Protocols, Application Security, Cryptography
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Mac OS, Network Security, Threat Management, Endpoint Security, Threat Detection, Computer Security Awareness Training, Security Strategy, Information Systems Security, Security Controls, Network Protocols, Automation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Threat Modeling, Application Security, Cloud Computing Architecture, Cloud Computing, Security Engineering, Cloud Security, Systems Architecture, Security Controls, Threat Management, Software As A Service, Infrastructure As A Service (IaaS), Computer Security, Threat Detection, Platform As A Service (PaaS), Cyber Security Assessment, Role-Based Access Control (RBAC), Data Integrity
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Prompt Engineering, Network Monitoring, Cloud Computing Architecture, Containerization, Network Architecture, Role-Based Access Control (RBAC), Network Security, OAuth, Network Routing, Cloud Security, Virtual Private Networks (VPN)
Build toward a degree
Intermediate · Professional Certificate · 3 - 6 Months