Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.
University of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, Computer Networking, Encryption, Network Infrastructure, Innovation, Hypertext Markup Language (HTML)
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Computer Security Awareness Training, Risk Management, Security Awareness, Enterprise Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Secure Coding, Application Security, Identity and Access Management, Information Systems Security Assessment Framework (ISSAF), Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Security Strategy, Zero Trust Network Access, Security Awareness, Security Information and Event Management (SIEM), Risk Management Framework, Disaster Recovery, Security Requirements Analysis, Cybersecurity, Enterprise Architecture
Beginner · Specialization · 1 - 3 Months

Northeastern University
Skills you'll gain: Cybersecurity, Cyber Attacks, Cryptography, Information Systems Security, Cyber Security Policies, Encryption, Data Security, Network Security, Security Controls, Network Protocols, Threat Modeling, Security Strategy, Personally Identifiable Information, Data Storage, Zero Trust Network Access, Governance Risk Management and Compliance
Mixed · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Network Protocols, Threat Management, Threat Modeling, Security Controls, Responsible AI, Cyber Attacks, Secure Coding, Cyber Security Policies, Data Security, Security Awareness, Computer Security Awareness Training, Agile Methodology, Cyber Risk, Cyber Threat Intelligence, Network Security, TCP/IP, Incident Response, Threat Detection, Risk Management
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Risk Analysis, Network Security, Risk Mitigation, Cyber Governance, Compliance Auditing, Event Monitoring, Application Security, Cyber Security Policies, Cyber Risk, Computer Security, Governance, Data Security, Information Systems Security, Infrastructure Security, Mobile Security, Risk Management
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Auditing, Compliance Auditing
Beginner · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Threat Modeling, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Information Systems Security, Risk Management, Continuous Monitoring, Information Assurance, Cyber Governance, Governance, Cybersecurity, Security Controls, Business Risk Management, ISO/IEC 27001, Threat Modeling, Risk Analysis, Threat Management, Vulnerability Assessments, Regulatory Compliance, System Monitoring, Information Systems, Asset Management, Intellectual Property
Advanced · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Responsible AI, Network Routing, Infrastructure Security, Application Security
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Security Requirements Analysis, Computer Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Security Strategy, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk, Enterprise Architecture, Data Integrity
Beginner · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Email Security, Wireless Networks, Mobile Security, Incident Response, Cybersecurity, Personally Identifiable Information, Cyber Attacks, Firewall, General Networking, Threat Detection, Cyber Security Policies, Computer Security Awareness Training, Proxy Servers, Computer Security Incident Management, Network Security, Threat Management, Security Awareness, Cyber Threat Intelligence, Virtual Private Networks (VPN), Social Media
Beginner · Specialization · 3 - 6 Months