Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Macquarie University
Skills you'll gain: Cryptography, Network Security, Encryption, Advanced Encryption Standard (AES), Cybersecurity, Key Management, Security Engineering, Data Integrity, Federated Learning, Security Management
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Information Privacy, Data Security, Artificial Intelligence, Cyber Risk, Cybersecurity, Security Strategy, Stakeholder Engagement
Beginner · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Identity and Access Management, Virtual Networking, Network Monitoring, Google Cloud Platform, Network Administration, Virtual Private Networks (VPN), General Networking, Network Troubleshooting, Network Security, Network Architecture, Cloud Computing, Cloud Security, Firewall, Cloud Management, Key Management, Load Balancing, DevOps, Encryption, Automation
Intermediate · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Penetration Testing, Security Testing, Cybersecurity, Network Security, Brute-force attacks, TCP/IP, Network Monitoring, Vulnerability Assessments, Servers, Network Analysis, Network Protocols
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Controls, Continuous Monitoring, Security Management, Vulnerability Management, Authorization (Computing), Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Governance, Health Information Management, Cloud Security, Health Care, Data Architecture, Identity and Access Management, Real Time Data, Scalability, Health Care Procedure and Regulation, Medical Records, Data Management, Data Sharing, Clinical Data Management, Microsoft Azure, Role-Based Access Control (RBAC), Regulatory Compliance, Information Privacy, Interoperability, Security Management, Encryption
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Application Security, Angular, OAuth, Test Driven Development (TDD), Cryptography, Web Components, Data Validation, Vue.JS, Data Security, Authentications, HTML and CSS, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Web Development, Web Applications, JavaScript Frameworks, Javascript, Security Strategy, Computer Programming
Beginner · Specialization · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, digital literacy, Information Systems Security, Security Strategy, Security Controls, Data Loss Prevention, Incident Response, Data Storage, Vulnerability Assessments, Patch Management
Mixed · Course · 1 - 3 Months

Skills you'll gain: Linux Administration, Linux, User Accounts, Identity and Access Management, Authentications, Virtual Machines, Virtualization, Operating System Administration, Security Controls, System Configuration, Command-Line Interface
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Cybersecurity, Vulnerability Management, Multi-Factor Authentication
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Data Lakes, Cloud Storage, Data Security, Data Access, Role-Based Access Control (RBAC), Cloud Computing, Big Data, Data Analysis
Beginner · Project · Less Than 2 Hours