Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Security Policies, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Infrastructure Architecture, Communication Systems, Package and Software Management, Linux, Software Versioning
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Exploit development, Application Security, Security Testing, Exploitation techniques, Vulnerability Scanning, Security Awareness, Vulnerability Assessments, Human Factors (Security), Hardening
Intermediate · Course · 1 - 3 Months

Universiteit Leiden
Skills you'll gain: Risk Management, Safety and Security, Security Management, Threat Management, Case Studies, Computer Security Incident Management, Public Safety and National Security, Risk Analysis, Cybersecurity, Incident Management, International Relations, Crisis Intervention, Policy Analysis, Governance, Public Policies
Beginner · Course · 1 - 3 Months

Skills you'll gain: Endpoint Detection and Response, Network Administration, Cryptographic Protocols, IT Security Architecture, Cloud Security, Data Loss Prevention, Cloud Deployment, Cyber Attacks, Security Controls, Infrastructure Security, Computer Security, Encryption, Cloud Computing, Authorization (Computing), Network Planning And Design, Identity and Access Management, System Configuration, Data Security, Authentications, Malware Protection
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Penetration Testing
Beginner · Course · 1 - 3 Months

Skills you'll gain: Command-Line Interface, Network Security, Operating Systems, Information Technology Operations, Network Support, Mac OS, Security Controls, Microsoft Windows, Information Systems Security, System Configuration, Mobile Security, System Support, Linux, Network Troubleshooting, Technical Support, Software Installation, Help Desk Support, Firewall, Malware Protection, Encryption
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Hardening, Incident Response, Vulnerability Assessments, Cyber Security Assessment, Security Strategy, Security Controls, Computer Security Incident Management, Infrastructure Security, Security Testing, Control Systems, Information Systems Security, Penetration Testing, Cyber Security Strategy, Cyber Attacks, Risk Analysis, Operational Risk, Data Security, Risk Management Framework, Risk Management, Operational Databases
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Vulnerability Management, Development Environment, Security Controls, DevOps, Data Security, Software Development Life Cycle
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Software Testing, Security Controls, System Monitoring, White-Box Testing, Threat Detection, IT General Controls (ITGC)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Data Integrity, Data Management, Cloud Management, Data Loss Prevention, Cloud Storage, Data Storage, Security Controls, Cloud Standards, Identity and Access Management
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Prompt Engineering, Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Distributed Denial-Of-Service (DDoS) Attacks, Prompt Engineering Tools, Cloud Development, Kubernetes, Cloud Security, Cloud Applications, Infrastructure As A Service (IaaS), Cloud Platforms, Cloud Management, Generative AI, Virtual Machines, Cloud Services, Data Loss Prevention, Cloud Storage, Security Management, Malware Protection
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Vulnerability Management, Google Cloud Platform, Infrastructure Security, Threat Detection, Security Controls, Data Security, Cloud API, Malware Protection, Email Security, Continuous Monitoring
Intermediate · Course · 1 - 3 Months