Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Cyber Security Strategy, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, IT Security Architecture, Cyber Attacks, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Systems Development Life Cycle, Security Architecture Review, Security Controls, Software Testing, Security Management, Software Development, Continuous Monitoring
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Prompt Engineering, Google Cloud Platform, Kubernetes, Distributed Denial-Of-Service (DDoS) Attacks, Identity and Access Management, Cloud Infrastructure, Cloud Security, Containerization, Authentications, Cloud Platforms, Cloud Services, Virtual Machines, Cloud Management, Infrastructure As A Service (IaaS), Data Loss Prevention, Cloud Storage, Cloud Computing, Data Storage Technologies, Network Infrastructure, Malware Protection
★ 4.5 (707) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Kubernetes, Google Cloud Platform, YAML, Cloud Deployment, Data Persistence, Containerization, Application Deployment, Configuration Management, MongoDB, Infrastructure Security, Network Security, Data Storage, Application Security, Application Programming Interface (API), Scalability, Authentications
★ 5 (8) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Threat Management, Vulnerability Scanning, Data Security, Identity and Access Management, Security Management, User Provisioning, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection, Public Key Infrastructure
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Kubernetes, Cloud-Native Computing, Public Key Infrastructure, Infrastructure Security, Threat Detection, Application Security, Cloud Security, Vulnerability Assessments, Containerization, IT Security Architecture, Cloud Platforms, Cloud Deployment, Cloud Computing Architecture
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Amazon CloudWatch, Network Troubleshooting, Continuous Monitoring, Identity and Access Management, AWS Identity and Access Management (IAM), Encryption, Network Security, Event Monitoring, Amazon Web Services, Security Controls, Cloud Security, IT Security Architecture, Cryptography, Network Monitoring, Network Performance Management, Cyber Security Policies, Security Requirements Analysis, Governance
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Brute-force attacks, Test Tools, Web Scraping
★ 4.3 (290) · Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Cloud Security, Encryption, Network Security, Cloud Platforms, AI Security, Identity and Access Management, DevSecOps, Cloud Computing, Cloud Services, Cloud Infrastructure, Infrastructure Security, Zero Trust Network Access, IT Security Architecture, Cryptography, Data Security, Multi-Cloud, Data Storage, AWS Identity and Access Management (IAM), Microsoft Azure, Data Encryption Standard
Beginner · Course · 3 - 6 Months

Skills you'll gain: Threat Detection, Cyber Threat Hunting, Anomaly Detection, Network Security, General Networking, Network Monitoring, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
★ 4 (9) · Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Authorization (Computing), Authentications, Azure DevOps, DevSecOps, Azure DevOps Pipelines, OAuth, Security Controls, Performance Tuning, Secure Coding, Identity and Access Management, Microsoft Azure, System Monitoring, DevOps, Continuous Monitoring, Qualys, Multi-Factor Authentication, Network Monitoring, Event Monitoring, SonarQube, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Computer Networking, Threat Modeling, Security Controls, Simple Object Access Protocol (SOAP), TCP/IP, Web Applications, Restful API, Information Privacy, OSI Models
★ 4.4 (172) · Intermediate · Course · 1 - 3 Months