Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Google Cloud
Skills you'll gain: Cloud Security, Threat Detection, Cloud Management, Google Cloud Platform, Cloud Computing, Intrusion Detection and Prevention, Network Security, Firewall, Security Information and Event Management (SIEM), Incident Response, Endpoint Security
Advanced · Project · Less Than 2 Hours

Skills you'll gain: File Management, OS Process Management, Linux, Linux Servers, Data Security, Linux Commands, Information Systems Security, System Monitoring, Data Storage Technologies, Network Security, Vulnerability Scanning, Data Storage, Encryption, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Integrity, Data Management, Personally Identifiable Information, Data Loss Prevention, Cloud Storage, Data Encryption Standard, Authorization (Computing)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Management, Security Requirements Analysis, Data Access, Vulnerability Assessments, Data Management, Information Management, Big Data
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Management, Cloud Security, Cloud Computing, Cloud Infrastructure, Cloud Standards, Cloud Platforms, Private Cloud, IT Security Architecture, Security Controls, Network Security
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Cloud Applications, Cloud Security, Cloud Development, Identity and Access Management, Secure Coding, Security Awareness, Security Testing, Data Security, Cloud Deployment, User Provisioning, Software Development, Verification And Validation, Software Quality Assurance, Threat Management, Authentications, Multi-Factor Authentication
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Kubernetes, Incident Response, Threat Detection, Intrusion Detection and Prevention, DevSecOps, Continuous Monitoring, Security Engineering, Cyber Threat Hunting, Security Controls, Infrastructure Security, Event Monitoring, System Monitoring, Containerization, Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Integrity, Data Integration, Power BI, Data Maintenance, Database Management, Microsoft SQL Servers, Relational Databases, Databases, Application Programming Interface (API), Dashboard, Data Visualization, Interactive Data Visualization, Business Intelligence, Data Security, Systems Integration, Role-Based Access Control (RBAC), Auditing, Real Time Data, Data Encryption Standard
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Cloud Security, Data Governance, Data Management, Data Security, Secure Coding, Cloud Applications, Application Security, Identity and Access Management, Key Management, Multi-Factor Authentication, Encryption, Role-Based Access Control (RBAC)
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Authentications, Cloud Security, Google Cloud Platform, Security Controls, Cloud Computing, Firewall, Authorization (Computing), Network Security, Data Security, Infrastructure Security, Virtual Networking, Technical Services, Load Balancing
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Kubernetes, Application Security, Containerization, Threat Detection, Encryption, Infrastructure Security, Security Engineering, Network Security, Hardening, Scenario Testing, Continuous Monitoring, Virtual Networking, Authorization (Computing), Authentications, YAML
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Role-Based Access Control (RBAC), Multi-Factor Authentication, Authorization (Computing), Security Controls, User Accounts, Key Management, Encryption, Command-Line Interface
Beginner · Course · 1 - 3 Months