Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Splunk Inc.
Skills you'll gain: Splunk, Data Modeling, Dashboard, Pivot Tables And Charts, Interactive Data Visualization, Data Management, Database Management, Visualization (Computer Graphics), Data Mapping, Incident Management, Query Languages, Data Integration, Information Management, Event Monitoring, Performance Tuning, Frontend Performance, Big Data, Business Intelligence, Data Analysis, Business Analytics
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Management, Threat Detection, Cybersecurity, Vulnerability Scanning, Cyber Attacks, Data Ethics, Vulnerability Assessments, Security Strategy, Network Security, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Microsoft Power Platform, Power BI, Microsoft Power Automate/Flow, Dashboard, Microsoft 365, Data Visualization Software, Data Visualization, Business Process Automation, Workflow Management, No-Code Development, Business Process, Generative AI Agents, Data Analysis, Data Integration, Application Design
Beginner · Course · 1 - 3 Months

Skills you'll gain: Hardware Troubleshooting, Desktop Support, Network Troubleshooting, Computer Hardware, System Configuration, Technical Support and Services, Network Administration, Computer Displays, Peripheral Devices, Data Storage, Configuration Management
Advanced · Course · 1 - 3 Months
Skills you'll gain: AI Security, Mobile Security, Model Deployment, Mobile Development, Continuous Monitoring, Application Security, Threat Modeling, Apple iOS, Security Requirements Analysis, System Monitoring, Encryption, Threat Management, Security Management, Information Privacy, Program Implementation
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Data Persistence, Computer Architecture
Intermediate · Course · 1 - 3 Months

SAE Institute México
Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Penetration Testing, Vulnerability Assessments, Cyber Operations, Cybersecurity, Information Systems Security, Network Security, Computer Networking, Network Protocols
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Virtual Machines, Virtual Private Networks (VPN), Cloud Security, Public Cloud, Amazon Web Services, Scalability, Virtual Networking, Private Cloud, Amazon Elastic Compute Cloud, Cloud Computing, Cloud Infrastructure
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: MySQL, Database Management, Stored Procedure, Database Design, Database Systems, Relational Databases, SQL, Database Development, Database Administration, Query Languages, Data Management, Data Integrity, Data Validation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Responsible AI, Data Literacy, AI Enablement, Data Mining, AI Product Strategy, Generative AI, Big Data, Information Architecture, Strategic Decision-Making, Enterprise Architecture, Cloud Computing, Data Analysis, Data Science, Digital Transformation, Natural Language Processing, Data-Driven Decision-Making, Data Architecture, Robotics, Business Logic, Leadership
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Network Security, Remote Access Systems, Disaster Recovery, OSI Models, General Networking, Network Administration, Network Troubleshooting, Computer Networking, Network Architecture, Network Infrastructure, Networking Hardware, Network Monitoring, TCP/IP, Virtual Private Networks (VPN), Network Protocols, Cybersecurity, Computer Security, Data Centers, Virtualization, Authentications
Intermediate · Specialization · 1 - 3 Months
Skills you'll gain: Mobile Security, AI Security, Threat Detection, Security Controls, Exploit development, Threat Modeling, Hardening, Endpoint Security, Artificial Intelligence, Mobile Development Tools, Deep Learning, Prompt Engineering, Incident Response, Information Privacy
Intermediate · Course · 1 - 4 Weeks