Data security courses can help you learn encryption techniques, risk assessment strategies, incident response planning, and compliance regulations. You can build skills in vulnerability management, threat detection, and secure coding practices. Many courses introduce tools like firewalls, intrusion detection systems, and data loss prevention software, demonstrating how these skills are applied to protect sensitive information and maintain system integrity.

Skills you'll gain: Data Storytelling, Data Presentation, Storytelling, Interactive Data Visualization, Data Visualization, Infographics, Dashboard, Data Visualization Software, Presentations, Data-Driven Decision-Making, Persuasive Communication
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Network Monitoring, Firewall, Google Cloud Platform, Cloud Security, Intrusion Detection and Prevention, Identity and Access Management, Proxy Servers, Threat Detection, Infrastructure Security
Intermediate · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Data Storytelling, Data Presentation, Power BI, Data Visualization Software, Data Visualization, Interactive Data Visualization, Statistical Visualization, Dashboard, Data-Driven Decision-Making, Business Intelligence, Pivot Tables And Charts, Data Analysis, Scatter Plots, Histogram
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Endpoint Security, Hardening, Virtual Private Networks (VPN), Firewall, Network Administration, Cloud Security, Cybersecurity, Infrastructure Security, Role-Based Access Control (RBAC), Cloud Computing, Authorization (Computing), Identity and Access Management, Email Security, Network Infrastructure, Network Protocols, Authentications, System Configuration
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, IT Security Architecture, Secure Coding, Application Security, Security Testing, Security Strategy, Security Requirements Analysis, Software Development Methodologies, Software Development Life Cycle, Systems Architecture, DevSecOps, Cyber Security Strategy, Penetration Testing, Business Risk Management, Compliance Management
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Extract, Transform, Load, Data Modeling, Clinical Data Management, Database Design, Data Warehousing, Data Quality, Data Transformation, Data Integration, Health Informatics, Relational Databases, SQL
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Presentations, Microsoft PowerPoint, Data Visualization, Data Storytelling, Video Editing
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Mac OS, Network Security, Threat Management, Endpoint Security, Threat Detection, Computer Security Awareness Training, Security Strategy, Information Systems Security, Security Controls, Network Protocols, Automation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Deployment, Microsoft Azure, Cloud Applications, Application Deployment, Application Programming Interface (API), Authentications, Payment Systems, Authorization (Computing), Role-Based Access Control (RBAC), UI Components, Identity and Access Management, Database Management, Transaction Processing, User Interface (UI)
Advanced · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Exploratory Data Analysis, Model Evaluation, Predictive Modeling, Data Science, Analytical Skills, Data Analysis, Data Presentation, Data Collection, Data Storytelling, Data Cleansing, Statistical Analysis, Data Manipulation, Data Preprocessing, R Programming, Machine Learning, Natural Language Processing
Mixed · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Gemini, Cloud Deployment, Google Cloud Platform, AI Security, Cloud Security, Generative AI, Security Controls, System Configuration
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
Intermediate · Course · 1 - 3 Months