Network security courses can help you learn about firewalls, intrusion detection systems, and encryption protocols. You can build skills in risk assessment, incident response, and vulnerability management. Many courses introduce tools like Wireshark for network analysis, Nessus for vulnerability scanning, and various security information and event management (SIEM) systems, showing how these skills are applied in practical work to protect networks from cyber threats.

Skills you'll gain: Security Controls
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Computer Systems, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Security Awareness, Computer Hardware, Information Systems Security, Computer Architecture, Data Storage, Patch Management, Cloud Computing
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, Data Security, Cybersecurity, Cloud Computing, Encryption, Network Security, Google Cloud Platform, Authorization (Computing), Authentications, Threat Detection, Data Storage, Identity and Access Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: AWS SageMaker, Amazon CloudWatch, AWS CloudFormation, Infrastructure as Code (IaC), CI/CD, Amazon Web Services, Devops Tools, AWS Identity and Access Management (IAM), Data Security, Cloud Security, Network Security, System Monitoring, Model Deployment, Systems Architecture, Data Pipelines, Multi-Factor Authentication, Key Management
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, Network Security, Encryption, Data Security, Cloud Computing, Cybersecurity, Cloud Standards, Threat Detection, Google Cloud Platform, Infrastructure Security, Authentications, Authorization (Computing), Data Governance, Multi-Factor Authentication, Identity and Access Management
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cloud Management, Cloud Security, Cloud Computing, Cloud Infrastructure, Cloud Standards, Cloud Platforms, Private Cloud, IT Security Architecture, Security Controls, Network Security
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Authentications, Cloud Security, Google Cloud Platform, Security Controls, Cloud Computing, Firewall, Authorization (Computing), Network Security, Data Security, Infrastructure Security, Virtual Networking, Technical Services, Load Balancing
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Vulnerability Assessments, System Design and Implementation, Threat Detection, Cryptography, Risk Management, Remote Access Systems
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Identity and Access Management, Security Management, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Public Key Infrastructure, Cryptography, Encryption, Data Security, Cryptographic Protocols, Data Integrity, Information Systems Security, Key Management, Network Security, Information Privacy, Authentications, Digital Communications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Awareness Training, Security Awareness, Cyber Attacks, Email Security, Cybersecurity, Malware Protection, Human Factors (Security), Encryption, Threat Detection, Multi-Factor Authentication, Internet Of Things, Information Privacy, Network Security, Personally Identifiable Information, Authentications, Data Security, Mobile Security, Identity and Access Management
Beginner · Course · 3 - 6 Months