Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Johns Hopkins University
Skills you'll gain: DevOps, DevSecOps, CI/CD, GitHub, Continuous Deployment, Continuous Integration, Version Control, Git (Version Control System), Process Improvement, Software Development, IT Automation, Digital Transformation, Business Transformation, Cross-Functional Collaboration, Continuous Improvement Process, Agile Methodology
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Modeling, Zero Trust Network Access, Security Management, DevSecOps, Identity and Access Management, Application Security, Cybersecurity, Data Security, Microsoft Azure, Cyber Security Strategy, Security Strategy, IT Security Architecture, Cloud Security, Azure Active Directory
Advanced · Course · 1 - 3 Months

FAIR Institute
Skills you'll gain: Cyber Risk, Risk Appetite, Cyber Governance, Risk Management, Regulatory Compliance, Risk Analysis, Cyber Security Strategy, Cybersecurity, Governance Risk Management and Compliance, Insurance, Compliance Management, Business Communication, Technical Communication, Strategic Communication, Business Reporting
Intermediate · Course · 1 - 4 Weeks

FAIR Institute
Skills you'll gain: Cyber Risk, Threat Management, Continuous Monitoring, Cyber Security Strategy, Risk Management, Risk Appetite, Enterprise Risk Management (ERM), Governance Risk Management and Compliance, Cybersecurity, Business Risk Management, Risk Modeling, Risk Mitigation, Risk Analysis, Governance, Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Risk Analysis, Risk Management, Incident Response, Business Continuity Planning, Security Management, Threat Modeling, Threat Management, Disaster Recovery, Vulnerability Assessments, Cyber Risk, Cyber Threat Intelligence, Continuous Monitoring, Cybersecurity, Vulnerability Management, Security Strategy, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Responsible AI, Generative AI, Information Systems Security Assessment Framework (ISSAF), Data Ethics, Information Privacy, Regulatory Compliance, Compliance Management, Risk Analysis, Artificial Intelligence, Risk Mitigation, Stakeholder Analysis
Intermediate · Course · 1 - 4 Weeks

FAIR Institute
Skills you'll gain: Cyber Risk, Risk Management, Enterprise Risk Management (ERM), Cyber Security Strategy, Risk Analysis, Risk Modeling, Threat Modeling, Business Risk Management, Compliance Management, Incident Response, Stakeholder Communications, Continuous Improvement Process, Compliance Reporting, Decision Making, Financial Analysis
Intermediate · Course · 1 - 4 Weeks

University of Minnesota
Skills you'll gain: Enterprise Resource Planning, Business Systems Analysis, Systems Analysis, Requirements Analysis, Cybersecurity, Business Requirements, Business Systems, Cloud Computing, IT Management, Supply Chain Systems, Change Management, Business Technologies, Information Technology, Organizational Change, Technology Strategies, System Implementation, User Requirements Documents, Technology Solutions, Project Management, Critical Thinking
Beginner · Specialization · 3 - 6 Months

The Chinese University of Hong Kong
Skills you'll gain: Communication Systems, Digital Communications, Theoretical Computer Science, Telecommunications, Informatics, Probability, Probability Distribution, Algorithms, General Mathematics
Mixed · Course · 3 - 6 Months

Skills you'll gain: Cloud Computing Architecture, Cloud Services, Generative AI, Cloud Security, Cybersecurity, Cloud Platforms, Cloud Hosting, Cloud Engineering, Cloud Computing, Data Storage, Peripheral Devices, Computer Hardware, Cyber Attacks, System Configuration, Artificial Intelligence, OSI Models, General Networking, Data Security, Cloud Infrastructure, Computer Programming
Beginner · Specialization · 3 - 6 Months

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Vulnerability Assessments, Application Specific Integrated Circuits, Exploit development, Cryptography, Systems Design, Encryption, Exploitation techniques, Technical Design, Emerging Technologies
Mixed · Course · 1 - 3 Months

Skills you'll gain: Information Technology, Computer Hardware, Cloud Computing, Network Troubleshooting, Software Installation, Technical Support and Services, Cybersecurity, Hardware Troubleshooting, Data Storage, Database Software, Operating Systems, Computer Networking, IT Infrastructure, Virtual Private Networks (VPN), Project Management
Beginner · Course · 1 - 3 Months