IoT device security courses can help you learn about threat modeling, vulnerability assessment, secure coding practices, and encryption techniques. You can build skills in risk management, incident response, and implementing security protocols across various devices. Many courses introduce tools like Wireshark for network analysis, Nessus for vulnerability scanning, and various encryption libraries, showing how these tools can be applied to enhance the security of IoT systems and protect against potential breaches.

Skills you'll gain: Kubernetes, Cloud Security, Containerization, Infrastructure Security, Microservices, Security Controls, Network Security, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Microsoft Azure, Vulnerability Assessments, Cloud Security, Continuous Monitoring, Key Management, Security Controls, Security Information and Event Management (SIEM), Incident Response, Security Management, Hybrid Cloud Computing, Role-Based Access Control (RBAC), Multi-Cloud, Incident Management, Threat Detection, Automation
Intermediate · Course · 1 - 4 Weeks

Banco Interamericano de Desarrollo
Skills you'll gain: Public Safety and National Security, Security Management, Program Evaluation, Governance, Social Justice, Policy Analysis, Policy Development, Public Policies, Criminal Investigation and Forensics, Social Work, Community Development, Conflict Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Application Security, Cloud Applications, Cloud Security, Identity and Access Management, Secure Coding, Security Awareness, Threat Modeling, Security Testing, Data Security, Software Development, Verification And Validation, Software Quality Assurance, Threat Management, Single Sign-On (SSO), Authentications, Multi-Factor Authentication
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Kubernetes, Application Security, Containerization, Threat Detection, Encryption, Infrastructure Security, Security Engineering, API Gateway, Network Security, Hardening, Scenario Testing, Continuous Monitoring, Authorization (Computing), Authentications
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: OAuth, Cloud API, Application Programming Interface (API), Restful API, Security Controls, Application Security, Network Security, Data Security, JSON, Identity and Access Management, Threat Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Continuous Monitoring, System Monitoring, Vulnerability Scanning, Vulnerability Assessments, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Security Management, Threat Detection, Risk Management Framework, Incident Response, Cyber Risk, Anomaly Detection
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Public Key Infrastructure, Cryptography, Encryption, Data Security, Cryptographic Protocols, Data Integrity, Information Systems Security, Key Management, Network Security, Information Privacy, Authentications, Digital Communications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Linux Administration, Ubuntu, Hardening, Linux, Application Security, Operating System Administration, Security Controls, Service Management, Patch Management, Information Systems Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Kubernetes, Incident Response, Threat Detection, Intrusion Detection and Prevention, DevSecOps, Continuous Monitoring, Security Engineering, Security Controls, Infrastructure Security, Event Monitoring, System Monitoring, Containerization, Anomaly Detection, Docker (Software)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Teams, Data Loss Prevention, Data Governance, Compliance Management, Role-Based Access Control (RBAC), Collaborative Software, Windows PowerShell, Security Management, Identity and Access Management, System Monitoring, System Configuration, Event Monitoring, Legal Technology
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Business Continuity Planning, Disaster Recovery, Computer Security Incident Management, Investigation, Business Continuity, Cybersecurity, Business Priorities, Resource Management, Resource Allocation, Prioritization, Risk Analysis, Business Analysis, Data Storage Technologies, Law, Regulation, and Compliance, Ethical Standards And Conduct
Beginner · Course · 1 - 4 Weeks