Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Kubernetes, Cloud-Native Computing, Public Key Infrastructure, Infrastructure Security, Threat Detection, Application Security, Cloud Security, Vulnerability Assessments, Containerization, IT Security Architecture, Cloud Platforms, Cloud Deployment, Cloud Computing Architecture
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Brute-force attacks, Test Tools, Web Scraping
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: File Management, Linux Administration, File Systems, OS Process Management, Linux, Linux Servers, Data Security, Authorization (Computing), Linux Commands, Data Loss Prevention, Operating System Administration, Continuous Monitoring, Information Systems Security, System Monitoring, Data Storage Technologies, Network Security, Vulnerability Scanning, Data Storage, Encryption, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Patch Management, Data Security, Cloud Security, Amazon Web Services, Data Governance, Cyber Governance, Cloud Management, Key Management, Encryption, IT Automation, Public Key Infrastructure, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Amazon CloudWatch, Network Troubleshooting, Continuous Monitoring, Identity and Access Management, AWS Identity and Access Management (IAM), Encryption, Network Security, Event Monitoring, Amazon Web Services, Security Controls, Cloud Security, IT Security Architecture, Cryptography, Network Monitoring, Network Performance Management, Cyber Security Policies, Security Requirements Analysis, Governance
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Network Security, Information Systems Security, Cloud Security, Cybersecurity, System Monitoring, Internet Of Things, Network Monitoring, Cyber Attacks, Mobile Security, Cryptography, Information Privacy, Authorization (Computing), Wireless Networks, Authentications, Data Storage, Patch Management, Operating Systems, Cloud Services, Cloud Platforms
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Linux, Authentications, Remote Access Systems, Linux Administration, User Accounts, Linux Commands, User Provisioning, Operating System Administration, Authorization (Computing), Identity and Access Management, Security Controls, Hardening, Command-Line Interface
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Authorization (Computing), Authentications, Azure DevOps, DevSecOps, Azure DevOps Pipelines, OAuth, Security Controls, Performance Tuning, Secure Coding, Identity and Access Management, Microsoft Azure, System Monitoring, DevOps, Continuous Monitoring, Qualys, Multi-Factor Authentication, Network Monitoring, Event Monitoring, SonarQube, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Network Monitoring, Firewall, Google Cloud Platform, Cloud Security, Intrusion Detection and Prevention, Identity and Access Management, Proxy Servers, Network Administration, Threat Detection, Infrastructure Security, Cyber Security Policies
Intermediate · Course · 1 - 3 Months

Skills you'll gain: General Networking, IT Security Architecture, Network Architecture, TCP/IP, OSI Models, Threat Management, Cybersecurity, Networking Hardware, Information Technology, Network Security, Threat Detection, Network Routers, Infrastructure Security, Security Controls, Cyber Attacks, Network Switches, Diagram Design, Cyber Security Strategy, Firewall, Security Software
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Threat Management, Vulnerability Scanning, Data Security, Identity and Access Management, Security Management, User Provisioning, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection, Public Key Infrastructure
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Computer Networking, Threat Modeling, Security Controls, Simple Object Access Protocol (SOAP), TCP/IP, Web Applications, Restful API, Information Privacy, OSI Models
Intermediate · Course · 1 - 3 Months