Data security courses can help you learn encryption techniques, risk assessment strategies, incident response planning, and compliance regulations. You can build skills in vulnerability management, threat detection, and secure coding practices. Many courses introduce tools like firewalls, intrusion detection systems, and data loss prevention software, demonstrating how these skills are applied to protect sensitive information and maintain system integrity.

LearnQuest
Skills you'll gain: Threat Management, Remote Access Systems, Vulnerability Assessments, Threat Detection, Security Requirements Analysis, Cyber Security Assessment, Cybersecurity, Security Software, Security Management, Telecommuting, Cyber Risk, Cyber Security Strategy, Cyber Security Policies, Security Controls, Risk Management Framework
Beginner · Course · 1 - 4 Weeks
Starweaver
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Anomaly Detection, System Monitoring, Identity and Access Management, Virtual Machines
Intermediate · Course · 1 - 3 Months

Ball State University
Skills you'll gain: Data Visualization, Rmarkdown, Exploratory Data Analysis, Data Visualization Software, Ggplot2, Interactive Data Visualization, Plot (Graphics), Statistical Visualization, R (Software), R Programming, Data Storytelling, Histogram, Scatter Plots, Data Analysis, Tidyverse (R Package), Data Manipulation
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Troubleshooting, Computer Security Incident Management, Incident Response, Cybersecurity, Cyber Attacks, Cyber Security Policies, Networking Hardware, Threat Detection, Technical Support, Network Security, General Networking, Computer Networking, Network Architecture, Network Administration, Network Protocols
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Key Management, Identity and Access Management, Single Sign-On (SSO), Amazon Web Services, Encryption, Amazon CloudWatch, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Infrastructure Security, Event Monitoring, Continuous Monitoring, Security Information and Event Management (SIEM), Application Security, Security Management, Firewall, Amazon Elastic Compute Cloud, Data Security, Incident Response, Compliance Management
Beginner · Specialization · 1 - 3 Months

Universiteit Leiden
Skills you'll gain: Risk Management Framework, Safety and Security, Threat Management, Case Studies, Public Safety and National Security, Cybersecurity, Incident Management, International Relations, Policy Analysis, Systems Thinking, Governance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, Vulnerability Scanning, Continuous Deployment
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Serverless Computing, Security Strategy, Network Security, Firewall, Cloud Management, Infrastructure As A Service (IaaS), Cyber Security Strategy, Distributed Denial-Of-Service (DDoS) Attacks, System Monitoring, Cloud Security, Application Security, Internet Of Things, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Simple Object Access Protocol (SOAP), TCP/IP, Restful API, Information Privacy
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Application Security, Exploitation techniques, Security Awareness, Malware Protection, Vulnerability Assessments, Javascript
Intermediate · Course · 1 - 3 Months

University of California, Irvine
Skills you'll gain: Data Storytelling, Data Presentation, Interactive Data Visualization, Statistical Visualization, Data Visualization Software, Tableau Software, Data Ethics, Exploratory Data Analysis, Scatter Plots, Heat Maps, Data Integrity
Mixed · Course · 1 - 4 Weeks