Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Google Cloud
Skills you'll gain: Vulnerability Management, Threat Detection, Vulnerability Assessments, Multi-Cloud, Cloud Security, Security Controls, Threat Management, Google Cloud Platform, Cloud Management, Enterprise Security, Security Information and Event Management (SIEM)
Intermediate · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Threat Modeling, Cyber Threat Intelligence, Incident Response, DevSecOps, MITRE ATT&CK Framework, Cloud Security, Threat Detection, Risk Management, Cost Management, Cyber Security Strategy, Governance, Security Controls, Vulnerability Assessments, Compliance Management, Role-Based Access Control (RBAC), Automation
Intermediate · Course · 1 - 4 Weeks

Beginner · Course · 1 - 3 Months

Skills you'll gain: Network Security, Wireless Networks, Network Performance Management, Network Monitoring, Dynamic Host Configuration Protocol (DHCP), Ansible, Network Administration, Firewall, Software-Defined Networking, Network Planning And Design, Network Infrastructure, Network Protocols, Infrastructure as Code (IaC), Terraform, Configuration Management, Encryption
Advanced · Course · 3 - 6 Months

Skills you'll gain: Network Security, Network Administration, Infrastructure Security, Ansible, Firewall, Security Controls, Wireless Networks, Network Monitoring, Computer Networking, Identity and Access Management, Network Protocols, Authorization (Computing), Scripting, Authentications, Automation, Test Planning, Encryption, Data Modeling
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Endpoint Detection and Response, Cloud Security, Network Administration, Infrastructure Security, Encryption, Cloud Computing, Authorization (Computing), Network Architecture, Dynamic Host Configuration Protocol (DHCP), Identity and Access Management, Email Security, Application Security, Human Factors (Security), Network Infrastructure, Network Protocols, Local Area Networks, Data Security, Authentications, Malware Protection, Mobile Security
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, White-Box Testing, Threat Detection, Threat Modeling
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
Intermediate · Guided Project · Less Than 2 Hours

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Knowledge of Apple Software, Apple Service Certification, Application Lifecycle Management, Endpoint Security, Knowledge of Apple Hardware, Mobile Development Tools, Test Planning
Advanced · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Threat Modeling, Vulnerability Assessments, Cybersecurity, Enterprise Security, Network Security, Regulation and Legal Compliance, Data Security, Secure Coding, Key Management, Application Frameworks, Distributed Denial-Of-Service (DDoS) Attacks, Emerging Technologies, Data Integrity
Beginner · Specialization · 1 - 3 Months