Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Vulnerability Scanning, Threat Management, Cloud Computing, Authentications, Active Directory, Operating Systems, Data Management, Computer Security Incident Management
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Remote Access Systems, User Accounts, Authorization (Computing)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS SageMaker, Amazon CloudWatch, AWS CloudFormation, Infrastructure as Code (IaC), CI/CD, Amazon Web Services, Devops Tools, AWS Identity and Access Management (IAM), Data Security, Cloud Security, Network Security, System Monitoring, Model Deployment, Systems Architecture, Data Pipelines, Multi-Factor Authentication, Key Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Role-Based Access Control (RBAC), Authorization (Computing), User Accounts, Cloud Security, Data Security, Cloud Platforms, Command-Line Interface
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Brute-force attacks, Web Scraping
Intermediate · Guided Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Cloud Security, Threat Detection, Cloud Management, Google Cloud Platform, Cloud Computing, Intrusion Detection and Prevention, Network Security, Firewall, Security Information and Event Management (SIEM), Incident Response, Endpoint Security
Advanced · Project · Less Than 2 Hours

Skills you'll gain: Cloud Security, Cloud Management, Site Reliability Engineering, Cost Management, Cloud Computing, Google Cloud Platform, DevOps, IT Security Architecture, Data Security, Multi-Tenant Cloud Environments, Financial Controls, System Monitoring, Cybersecurity, Identity and Access Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Management, Continuous Monitoring, System Monitoring, Vulnerability Scanning, Vulnerability Assessments, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Security Management, Threat Detection, Risk Management Framework, Incident Response, Cyber Risk, Anomaly Detection
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: General Networking, Network Architecture, Cybersecurity, Computer Networking, Network Security, Threat Detection, Network Routers, Security Controls, Cyber Attacks, Network Switches, Diagram Design, Firewall, Security Strategy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Deployment, Cloud Computing Architecture, Public Cloud, Cloud Security, Data Import/Export, Load Balancing, Virtual Networking, Multi-Factor Authentication, Event Monitoring, Data Storage, MySQL, Key Management, Scalability
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cloud Deployment, Microsoft Azure, Cloud Applications, Application Deployment, Application Programming Interface (API), Authentications, Payment Systems, Authorization (Computing), Role-Based Access Control (RBAC), UI Components, Identity and Access Management, Database Management, Transaction Processing, User Interface (UI)
Advanced · Course · 1 - 3 Months

Skills you'll gain: Linux, Authentications, Remote Access Systems, Linux Administration, User Accounts, Authorization (Computing), Security Controls, System Configuration, Command-Line Interface, Cryptographic Protocols
Intermediate · Course · 1 - 4 Weeks