Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Identity and Access Management, Kubernetes, OAuth, Encryption, Cloud API, Application Security, Authorization (Computing), Data Encryption Standard, Cloud Storage, Authentications, Data Security, Application Programming Interface (API), Virtual Machines, Vulnerability Scanning, Key Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Detection, Threat Management, Cloud Security, Google Cloud Platform, Vulnerability Management, Vulnerability Assessments, Security Information and Event Management (SIEM), Public Cloud
Intermediate · Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Cloud Security, Data Security, Cybersecurity, Cloud Computing, Encryption, Network Security, Google Cloud Platform, Authorization (Computing), Authentications, Threat Detection, Data Storage, Identity and Access Management
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Threat Detection, Vulnerability Management, Threat Management, Cloud Security, Vulnerability Assessments, Security Management, Multi-Cloud, Risk Management Framework, Incident Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, ChatGPT, Infrastructure Security, Security Information and Event Management (SIEM), AI Security, General Networking, Threat Detection, Incident Response, Cloud Security, Virtual Machines
Beginner · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Cloud Security, Firewall, Network Monitoring, Google Cloud Platform, Network Troubleshooting, Intrusion Detection and Prevention, Identity and Access Management, Threat Detection, Proxy Servers
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Vulnerability Assessments, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Linux Commands, Computer Architecture, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Kubernetes, Cloud Security, Google Cloud Platform, Encryption, OAuth, Identity and Access Management, Security Controls, Authorization (Computing), Application Security, Authentications, Data Security, Key Management, Cloud Applications, Role-Based Access Control (RBAC), Cloud Storage, Data Encryption Standard, Virtual Machines, Vulnerability Scanning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Single Sign-On (SSO), Amazon Web Services, Cloud Security, Security Management, Incident Response, Amazon CloudWatch, Amazon Elastic Compute Cloud, Amazon S3, Multi-Factor Authentication, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Banco Interamericano de Desarrollo
Skills you'll gain: Public Safety and National Security, Security Management, Program Evaluation, Governance, Social Justice, Policy Analysis, Policy Development, Public Policies, Criminal Investigation and Forensics, Social Work, Community Development, Conflict Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Patch Management, Amazon CloudWatch, Infrastructure Security, Threat Detection, Amazon S3, Vulnerability Scanning, Data Security, Cloud Security, Network Security, Threat Management, Incident Response, Data Governance, Authorization (Computing), Continuous Monitoring, Cyber Governance, Firewall, Role-Based Access Control (RBAC)
Advanced · Specialization · 1 - 3 Months

University of London
Skills you'll gain: Digital Forensics, Key Management, Security Management, Human Factors (Security), Application Security, Information Privacy, Cyber Governance, Infrastructure Security, Cryptography, Threat Modeling, OSI Models, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, ISO/IEC 27001, Network Security, Malware Protection, Incident Management, Statistical Analysis, Cyber Security Strategy
Earn a degree
Degree · 1 - 4 Years