Network security courses can help you learn about firewalls, intrusion detection systems, and encryption protocols. You can build skills in risk assessment, incident response, and vulnerability management. Many courses introduce tools like Wireshark for network analysis, Nessus for vulnerability scanning, and various security information and event management (SIEM) systems, showing how these skills are applied in practical work to protect networks from cyber threats.

Skills you'll gain: Linux Administration, Ubuntu, Hardening, Linux Servers, Linux, Linux Commands, Application Security, Operating System Administration, Security Controls, Service Management, Patch Management, Systems Administration, Information Systems Security, Package and Software Management
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Vulnerability Assessments, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Linux Commands, Computer Architecture, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Kubernetes, Application Security, Containerization, Threat Detection, Encryption, Infrastructure Security, Security Engineering, Network Security, Hardening, Scenario Testing, Continuous Monitoring, Virtual Networking, Authorization (Computing), Authentications, YAML
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Linux, Authentications, Remote Access Systems, Linux Administration, User Accounts, Authorization (Computing), Security Controls, System Configuration, Command-Line Interface, Cryptographic Protocols
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Network Security, Information Systems Security, Cloud Security, Cybersecurity, System Monitoring, Internet Of Things, Network Monitoring, Cyber Attacks, Mobile Security, Cryptography, Information Privacy, Authorization (Computing), Wireless Networks, Authentications, Data Storage, Patch Management, Operating Systems, Cloud Services, Cloud Platforms
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Kubernetes, Incident Response, Threat Detection, DevSecOps, Continuous Monitoring, Security Controls, Infrastructure Security, Event Monitoring, System Monitoring, Containerization, Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Google Gemini, Cloud Deployment, Google Cloud Platform, AI Security, Generative AI, Cloud Security, Security Controls, Threat Detection
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Authentications, Cloud Security, Google Cloud Platform, Security Controls, Cloud Computing, Firewall, Role-Based Access Control (RBAC), Authorization (Computing), Virtual Private Networks (VPN), Multi-Factor Authentication, Network Security, Infrastructure Security, Virtual Networking, Load Balancing
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Deployment, Malware Protection, Information Systems Security, Virtual Machines, Virtualization, Firewall, Intrusion Detection and Prevention, Security Awareness, Containerization, User Provisioning
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: AWS SageMaker, Amazon CloudWatch, Infrastructure as Code (IaC), CI/CD, Amazon Web Services, Cloud Engineering, Devops Tools, AWS Identity and Access Management (IAM), Data Security, Cloud Security, Network Security, System Monitoring, Model Deployment, Systems Architecture, Multi-Factor Authentication, Key Management, Virtual Networking
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Integrity, Data Management, Personally Identifiable Information, Data Loss Prevention, Cloud Storage, Data Encryption Standard, Authorization (Computing)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Digital Forensics, Business Continuity Planning, Disaster Recovery, Computer Security Incident Management, Resource Management, Prioritization, Risk Analysis, Business Analysis, Data Storage Technologies, Law, Regulation, and Compliance, Ethical Standards And Conduct
Beginner · Course · 1 - 4 Weeks