Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Information Systems Security, Cybersecurity, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Computational Logic, Algorithms
Intermediate · Specialization · 3 - 6 Months

Google Cloud
Skills you'll gain: Looker (Software), Responsible AI, Data Lakes, Data Storytelling, Data Governance, Google Gemini, Data Visualization, Dashboard, Data Architecture, Data Pipelines, Data Visualization Software, Data Management, Cloud Infrastructure, Generative AI, Data Cleansing, Gemini, Cloud Storage, Data Transformation, Identity and Access Management, Data Literacy
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Exploit development, Security Testing, Test Tools, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Assessments, Application Security, Web Servers, Network Protocols, Web Applications, Test Automation, Development Environment, Proxy Servers, Authentications
Beginner · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Exploitation techniques, Data Encryption Standard, Threat Modeling, Security Awareness, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, AI Security, Vulnerability Assessments, Application Security, Security Engineering, Artificial Intelligence, SQL
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Disaster Recovery, Business Continuity Planning, Contingency Planning, Business Risk Management, Data Loss Prevention, Risk Analysis, General Data Protection Regulation (GDPR), Personally Identifiable Information, Standard Operating Procedure, Incident Response, Threat Management, Compliance Management, Program Development, Continuous Improvement Process
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: OSI Models, TCP/IP, Vulnerability Scanning, General Networking, Network Protocols, Cyber Security Assessment, Network Security, Network Monitoring, Network Administration, Vulnerability Assessments, Firewall, Performance Tuning, Threat Detection, Network Analysis, Scripting, System Configuration
Intermediate · Course · 1 - 3 Months

Pearson
Skills you'll gain: Zero Trust Network Access, Cybersecurity, Vulnerability Assessments, Cyber Security Strategy, Cyber Security Assessment, IT Security Architecture, Network Security, Threat Modeling, Security Strategy, Security Controls, Cloud Security, Authentications, Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Secure Coding, Application Security, System Programming, C++ (Programming Language), C (Programming Language), Unix, Embedded Systems, Debugging, Unix Commands, Operating Systems, Data Security, Linux, Microsoft Windows
Mixed · Course · 1 - 4 Weeks
Codio
Skills you'll gain: Infrastructure as Code (IaC), Terraform, Docker (Software), Kubernetes, Ansible, Containerization, Ubuntu, Cloud Infrastructure, Cloud Management, Cloud-Native Computing, Cloud Computing Architecture, Systems Development, Application Deployment, Firewall, Infrastructure As A Service (IaaS), Security Controls, Unix, Bash (Scripting Language), Amazon Web Services, Amazon Elastic Compute Cloud
Beginner · Specialization · 1 - 3 Months

University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authorization (Computing), Cyber Risk, Authentications, Continuous Monitoring, Threat Modeling, Security Controls, Application Security, Secure Coding, System Monitoring, Cryptography, Data Security, Identity and Access Management, Infrastructure Security, Hardening
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Microsoft Azure, Active Directory, Authorization (Computing), Identity and Access Management, User Provisioning, Group Policy, Cloud Management, Cloud Security, User Accounts, Cloud Storage, Data Security, Data Storage Technologies, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Kubernetes, Prompt Engineering, Google Cloud Platform, Containerization, Application Deployment, Cloud Infrastructure, Cloud Deployment, Cloud Storage, Virtual Machines, Infrastructure As A Service (IaaS), Cloud Services, Generative AI Agents, Identity and Access Management, CI/CD, Cloud Computing, Scalability, Data Persistence, Network Infrastructure, Application Development, Cloud Security
Beginner · Specialization · 3 - 6 Months