Data security courses can help you learn encryption techniques, risk assessment strategies, incident response planning, and compliance regulations. You can build skills in vulnerability management, threat detection, and secure coding practices. Many courses introduce tools like firewalls, intrusion detection systems, and data loss prevention software, demonstrating how these skills are applied to protect sensitive information and maintain system integrity.

Mixed · Course · 1 - 4 Weeks

Mixed · Course · 1 - 4 Weeks

Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Data Security, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Secure Coding, Public Key Infrastructure, Authentications, Identity and Access Management, Web Development, Application Security, Web Applications, Multi-Factor Authentication, Security Strategy
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: Data Loss Prevention, AI Security, Responsible AI, Information Privacy, Data Ethics, Security Controls, Personally Identifiable Information, Data Security, Threat Management, Security Awareness, Security Management, General Data Protection Regulation (GDPR), Authorization (Computing), Incident Response, Cyber Security Policies, Role-Based Access Control (RBAC), Cyber Governance, Governance, Risk Management Framework, Generative AI
Intermediate · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Responsible AI, AI Security, Telehealth, Health Technology, Generative AI, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Healthcare Ethics, Regulatory Compliance, Health Care Procedure and Regulation, Security Strategy, Medical Privacy, Data Security, Analysis, Innovation, Design
Intermediate · Course · 1 - 4 Weeks

Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, IT Security Architecture, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Management, Security Requirements Analysis, Data Access, Vulnerability Assessments, Data Management, Information Management, Big Data
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Data Flow Diagrams (DFDs), Open Web Application Security Project (OWASP), Software Architecture, Secure Coding, Software Design Patterns, Database Management, Software Engineering Tools, Security Software, Systems Design, Software Development Life Cycle, Technical Design
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Vulnerability Management, Security Information and Event Management (SIEM), Penetration Testing, Vulnerability Assessments, Cybersecurity, Intelligence Collection and Analysis, Vulnerability Scanning, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Analysis, Network Analysis, Auditing, Data Analysis, Linux Commands, Data Collection, Correlation Analysis, Bash (Scripting Language), Windows PowerShell
Mixed · Course · 1 - 4 Weeks

Northeastern University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Ethics, Law, Regulation, and Compliance, Data Security, Journalism, digital literacy, Emerging Technologies, Media and Communications, Internet Of Things, Algorithms, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Cloud Security, Data Governance, Data Management, Data Security, Secure Coding, Cloud Applications, Application Security, Identity and Access Management, Key Management, Multi-Factor Authentication, Encryption, Role-Based Access Control (RBAC)
Advanced · Course · 1 - 4 Weeks