Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

The University of Melbourne
Skills you'll gain: Mental Status Examination, Psychiatry, Medical History Documentation, Healthcare Ethics, Psychosocial Assessments, Mental and Behavioral Health, Patient Communication, Cultural Sensitivity, Patient Evaluation, Interpersonal Communications, Interviewing Skills, Rapport Building
Advanced · Course · 1 - 3 Months

Skills you'll gain: Azure DevOps Pipelines, Kubernetes, Azure DevOps, Node.JS, CI/CD, DevOps, Application Lifecycle Management, Microservices, Program Development, Containerization, Software Testing, Debugging, Cloud Development, Cloud Deployment, Application Deployment, Scripting, Version Control, Git (Version Control System)
Intermediate · Course · 1 - 4 Weeks

Campus BBVA
Skills you'll gain: Data Storytelling, Data-Driven Decision-Making, Data Visualization, Business Analytics, Dashboard, Data Quality, Data Analysis, Descriptive Statistics, Business Intelligence, Probability & Statistics, Statistical Inference, Statistics, Big Data, Statistical Analysis, Key Performance Indicators (KPIs)
Beginner · Course · 1 - 3 Months

Skills you'll gain: Wireless Networks, Mobile Security, Networking Hardware, Hardware Troubleshooting, USB, Computer Hardware, System Configuration, Peripheral Devices, Computer Displays, Data Storage
Intermediate · Course · 1 - 4 Weeks

Yale University
Skills you'll gain: Court Systems, Political Sciences, Public Safety and National Security, Civil Law, Social Justice, Policy Analysis, Public Policies, Governance, Cultural Diversity
Mixed · Course · 3 - 6 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Brute-force attacks, Cyber Security Assessment, Vulnerability Assessments, Authentications, Wireless Networks, Network Security, Linux, Encryption, Microsoft Windows, Cryptography, Operating Systems
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Databricks, Data Governance, Microsoft Azure, Data Lakes, Real Time Data, Data Management, Data Integration, Data Pipelines, Data Quality, User Provisioning, Performance Tuning
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Computer Vision, Image Analysis, Model Evaluation, Deep Learning, Matlab, Machine Learning Methods, Convolutional Neural Networks, Data Preprocessing, Machine Learning, Classification Algorithms, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning Algorithms, Transfer Learning, Geospatial Information and Technology, Traffic Flow Optimization, Medical Imaging, Data Validation, Estimation, Algorithms
Intermediate · Specialization · 1 - 3 Months
Skills you'll gain: GitLab, CI/CD, Application Deployment, Continuous Integration, Devops Tools, DevOps, Build Tools, Continuous Delivery, Continuous Deployment, Security Testing, Test Automation, DevSecOps, Unit Testing, Program Development, Secure Coding, Vulnerability Scanning
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Risk Management, Risk Appetite, Continuous Monitoring, Risk Mitigation, Vulnerability Management, Threat Detection
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Epidemiology, Trend Analysis, Chronic Diseases, Public Health, Public Health and Disease Prevention, Health Policy, Data Analysis, Biostatistics, System Monitoring, Health Informatics, Technical Communication, Media and Communications, Infectious Diseases, Law, Regulation, and Compliance, Data Ethics, Data Collection, Risk Analysis, Information Privacy
Beginner · Course · 1 - 4 Weeks
Starweaver
Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Threat Management, Information Systems Security, Information Assurance, Security Controls, Security Management, Cybersecurity, Cyber Security Strategy, Cyber Security Assessment, Endpoint Detection and Response, Security Information and Event Management (SIEM), Incident Response, Continuous Monitoring, Data Security, Risk Management Framework, Technical Communication
Intermediate · Course · 1 - 3 Months