Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Skills you'll gain: Microsoft Copilot, Microsoft Power Automate/Flow, Microsoft Power Platform, Microsoft 365, Collaborative Software, Security Controls, Continuous Monitoring, Security Management, AI Integrations, AI Enablement, Threat Detection, Compliance Management, AI Security, Generative AI Agents, Workflow Management, Automation, Incident Response, Generative AI
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Network Security, Cryptographic Protocols, OSI Models, Public Key Infrastructure, Cybersecurity, Advanced Encryption Standard (AES), Key Management, Network Protocols, Encryption, Threat Modeling, Data Encryption Standard, Remote Access Systems, Firewall, Brute-force attacks, Emerging Technologies, TCP/IP, Wireless Networks, Local Area Networks, Authentications
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Cyber Attacks, Multi-Factor Authentication, Data Governance, Key Management, Security Management, Authorization (Computing), Containerization, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Security Information and Event Management (SIEM), Penetration Testing, Vulnerability Assessments, Cybersecurity, Intelligence Collection and Analysis, Vulnerability Scanning, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Analysis, Network Analysis, Auditing, Data Analysis, Linux Commands, Data Collection, Correlation Analysis, Bash (Scripting Language), Windows PowerShell
Mixed · Course · 1 - 4 Weeks

Alex Genadinik
Skills you'll gain: Data Security, Risk Management Framework, Key Management, Cybersecurity, Data Storage, USB, Payment Systems, Public Key Cryptography Standards (PKCS), Transaction Processing
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Google Cloud Platform, Cloud Computing Architecture, Cloud Security, Cloud Infrastructure, Cloud Computing, Cloud Deployment, Identity and Access Management, Data Loss Prevention, Cloud Management, Cloud Services, Infrastructure as Code (IaC), Scalability, Serverless Computing, Authentications, Data Security, Personally Identifiable Information, Application Performance Management, Key Management, System Monitoring, Event-Driven Programming
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Identity and Access Management, Kubernetes, OAuth, Security Controls, Encryption, Cloud API, Security Awareness, Application Security, Authorization (Computing), Cloud Storage, Authentications, Data Security, Hardening, Application Programming Interface (API), Virtual Machines, Vulnerability Scanning, Data Persistence, Key Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Patch Management, Amazon CloudWatch, Infrastructure Security, Threat Detection, Amazon S3, Vulnerability Scanning, Data Security, Cloud Security, Network Security, Threat Management, Incident Response, Data Governance, Security Assertion Markup Language (SAML), Authorization (Computing), Continuous Monitoring, Cyber Governance, Firewall
Advanced · Specialization · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Kubernetes, OAuth, Security Controls, Role-Based Access Control (RBAC), Authentications, Application Security, Cloud Storage, Authorization (Computing), Data Access, Data Security, Encryption, Vulnerability Scanning, Virtual Machines, Key Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Data Governance, Personally Identifiable Information, Information Privacy, Data Security, General Data Protection Regulation (GDPR), Data Ethics, Data Management, Law, Regulation, and Compliance, Security Strategy, Compliance Management, Regulatory Compliance, Risk Mitigation, Risk Analysis, Regulatory Requirements, Cross-Functional Team Leadership, Cross-Functional Collaboration, Role-Based Access Control (RBAC), Encryption, Accountability
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Network Troubleshooting, Proxy Servers, Network Monitoring, Cloud Security, Intrusion Detection and Prevention, Firewall, Google Cloud Platform, Infrastructure Security, Threat Detection, Security Controls, Hardening, Network Analysis, Identity and Access Management
Intermediate · Course · 1 - 3 Months

Check Point Software Technologies Ltd.
Skills you'll gain: Virtual Private Networks (VPN), Threat Management, Network Security, Firewall, Threat Detection, Intrusion Detection and Prevention, Disaster Recovery, Remote Access Systems, Network Administration, Data Integrity, Network Monitoring, Cyber Security Policies, Security Controls, System Configuration, Network Troubleshooting, Security Management, System Monitoring, Active Directory
Beginner · Course · 1 - 4 Weeks