Data security courses can help you learn encryption techniques, risk assessment strategies, incident response planning, and compliance regulations. You can build skills in vulnerability management, threat detection, and secure coding practices. Many courses introduce tools like firewalls, intrusion detection systems, and data loss prevention software, demonstrating how these skills are applied to protect sensitive information and maintain system integrity.

Skills you'll gain: Correlation Analysis, Solution Design
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Cyber Security Strategy, Solution Architecture, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk, Enterprise Architecture, Data Integrity
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Gemini, Google Cloud Platform, Application Deployment, Cloud Security, Generative AI, Security Controls, System Configuration
Beginner · Course · 1 - 4 Weeks

Palo Alto Networks
Skills you'll gain: Cyber Operations, Cyber Threat Intelligence, Endpoint Security, Security Information and Event Management (SIEM), Continuous Monitoring, Threat Detection, Threat Management, Enterprise Security, Incident Response, Malware Protection, Automation, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Vulnerability Management, Security Information and Event Management (SIEM), Cyber Operations, Event Monitoring, Cyber Threat Hunting, Intrusion Detection and Prevention, Cyber Threat Intelligence, Enterprise Security, Threat Detection, Data Loss Prevention, Security Controls, Network Security, Network Monitoring
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
Beginner · Course · 1 - 3 Months

Skills you'll gain: Network Security, Virtualization, Augmented and Virtual Reality (AR/VR), Cloud Computing Architecture, Virtual Machines, Cloud Computing, Firewall, Network Architecture, Virtual Private Networks (VPN), Mobile Security, Cloud Security, Wireless Networks, Network Protocols, Peripheral Devices
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
Intermediate · Guided Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Google Gemini, Google Cloud Platform, Application Deployment, Generative AI, Cloud Security, Infrastructure Security, System Configuration, Vulnerability Assessments
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Network Security, Responsible AI, Cybersecurity, Infrastructure Security, Information Systems Security, Threat Modeling, Firewall, Governance, Network Protocols, Internet Of Things, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Secure Coding, Application Security, C and C++, Verification And Validation, Vulnerability Management, Linux, Security Controls, Vulnerability Assessments, Threat Modeling, Data Validation, Debugging, Cryptography, C (Programming Language), Identity and Access Management, Encryption, File Management, OS Process Management
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks