Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Macquarie University
Skills you'll gain: Cyber Governance, Safety Culture, Dashboard, Cyber Threat Intelligence, Communication, Business Metrics, Security Strategy, Governance, Governance Risk Management and Compliance, Communication Strategies, Strategic Communication, Culture Transformation, IT Management, Enterprise Security, Cyber Operations, Regulatory Requirements, Leadership, Risk Mitigation, Initiative and Leadership, Organizational Leadership
Beginner · Course · 1 - 3 Months

Alex Genadinik
Skills you'll gain: Data Security, Risk Management Framework, Key Management, Cybersecurity, Data Storage, USB, Payment Systems, Public Key Cryptography Standards (PKCS), Transaction Processing
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: User Provisioning, Azure Active Directory, Cloud Security, Microsoft Azure, Security Information and Event Management (SIEM), Identity and Access Management, Role-Based Access Control (RBAC), IT Security Architecture, Security Controls, Multi-Factor Authentication, Authentications, Continuous Monitoring, Key Management, Threat Detection, Incident Response, General Data Protection Regulation (GDPR), Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Role-Based Access Control (RBAC), Hardening, Identity and Access Management, Kubernetes, Infrastructure Security, Network Security, Firewall, Security Controls, Authorization (Computing), Linux Administration, System Configuration
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Endpoint Security, Cyber Threat Hunting, Cyber Threat Intelligence, Endpoint Detection and Response, Cloud Solutions, Cloud Security, Threat Detection, Cyber Operations, Threat Management, Microsoft Copilot, Malware Protection, Security Information and Event Management (SIEM), AI Security, Microsoft Azure, Vulnerability Management, Cloud Computing, Incident Response, Hybrid Cloud Computing, AI Integrations
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Cyber Attacks, Multi-Factor Authentication, Data Governance, Key Management, Security Management, Authorization (Computing), Containerization, Network Analysis
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Security Testing, Unix, Cyber Operations, Computer Security, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Memory Management, Remote Access Systems, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Management, Security Information and Event Management (SIEM), Penetration Testing, Vulnerability Assessments, Cybersecurity, Intelligence Collection and Analysis, Vulnerability Scanning, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Analysis, Network Analysis, Auditing, Data Analysis, Linux Commands, Data Collection, Correlation Analysis, Bash (Scripting Language), Windows PowerShell
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Google Cloud Platform, Cloud Computing Architecture, Cloud Security, Cloud Infrastructure, Cloud Computing, Cloud Deployment, Identity and Access Management, Data Loss Prevention, Cloud Management, Cloud Services, Infrastructure as Code (IaC), Scalability, Serverless Computing, Authentications, Data Security, Personally Identifiable Information, Application Performance Management, Key Management, System Monitoring, Event-Driven Programming
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Desktop Support, Package and Software Management, Technical Support and Services, Computer Hardware, Technical Support, Software Installation, System Support, Network Support, General Networking, Help Desk Support, Technical Documentation, Hardware Troubleshooting, Software Documentation, Customer Support, End User Training and Support, Computer Networking, Information Technology, Technical Writing, Computer Systems, Linux
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Network Security, Cryptographic Protocols, OSI Models, Public Key Infrastructure, Cybersecurity, Advanced Encryption Standard (AES), Key Management, Network Protocols, Encryption, Threat Modeling, Data Encryption Standard, Remote Access Systems, Firewall, Brute-force attacks, Emerging Technologies, TCP/IP, Wireless Networks, Local Area Networks, Authentications
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Identity and Access Management, Private Cloud, Google Cloud Platform, User Provisioning, Cloud Security, Network Troubleshooting, Network Security, Virtual Networking, User Accounts
Intermediate · Course · 1 - 3 Months