Data security courses can help you learn encryption techniques, risk assessment strategies, incident response planning, and compliance regulations. You can build skills in vulnerability management, threat detection, and secure coding practices. Many courses introduce tools like firewalls, intrusion detection systems, and data loss prevention software, demonstrating how these skills are applied to protect sensitive information and maintain system integrity.

University of Colorado Boulder
Skills you'll gain: Probability, Probability & Statistics, Probability Distribution, Bayesian Statistics, Statistical Methods, Data Analysis, Statistical Inference, Statistical Analysis, Artificial Intelligence
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Infrastructure Security, Security Controls, Cloud Infrastructure
Beginner · Course · 1 - 3 Months

DeepLearning.AI
Skills you'll gain: Applied Mathematics, Calculus, Numerical Analysis, Mathematical Modeling, Machine Learning, Python Programming, Regression Analysis, Artificial Neural Networks, Deep Learning, Derivatives
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Excel Formulas, Microsoft Excel, Power BI, Spreadsheet Software, Timelines, Data Analysis, Data Manipulation, Data Presentation, Data Cleansing
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Authentications, Application Security, Open Web Application Security Project (OWASP), Secure Coding, Serverless Computing, Cryptography, Risk Management Framework, Threat Modeling, Cloud Security, Infrastructure Security, Package and Software Management, Node.JS, Web Applications, Javascript, Vulnerability Management, Cloud Services, Cloud Platforms, Web Development, Identity and Access Management, Vulnerability Assessments
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Application Security, OSI Models, Cryptography, Encryption, Endpoint Security, Firewall, Malware Protection, Wireless Networks, Network Protocols, Public Key Infrastructure, Data Integrity, Virtualization
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Theoretical Computer Science, Algorithms, Data Structures, Graph Theory, Operations Research, Public Key Cryptography Standards (PKCS), Computational Thinking, Computer Programming, Programming Principles, Cryptography, Computer Science, Pseudocode, Applied Mathematics, Advanced Mathematics, Mathematical Theory & Analysis, Encryption, Combinatorics, Python Programming, Analysis, Mathematical Modeling
Build toward a degree
Advanced · Specialization · 3 - 6 Months

University of Michigan
Skills you'll gain: Debugging, Data Analysis, Data Processing, Numerical Analysis, Critical Thinking
Intermediate · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Incident Response, Disaster Recovery, Incident Management, Security Management, Cyber Operations, Business Continuity Planning, Safety and Security, Change Control, Threat Management, Security Information and Event Management (SIEM), Patch Management, Security Controls, Cybersecurity, Threat Detection, Intrusion Detection and Prevention, Hardening, Configuration Management, Continuous Monitoring, Vulnerability Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Power BI, Data-Driven Decision-Making, Data Analysis, Data Literacy, Data Collection, Business Analytics, Data Cleansing, Data Transformation, Data Visualization Software, Microsoft 365
Beginner · Course · 1 - 4 Weeks

DeepLearning.AI
Skills you'll gain: Descriptive Statistics, Bayesian Statistics, Statistical Hypothesis Testing, Probability & Statistics, Sampling (Statistics), Probability Distribution, Probability, Statistical Inference, A/B Testing, Statistical Analysis, Statistical Machine Learning, Data Science, Exploratory Data Analysis, Statistical Visualization
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Fraud detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Security Strategy, Threat Modeling, Email Security, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
Intermediate · Specialization · 3 - 6 Months