Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

University of Colorado Boulder
Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Data Security, LLM Application, Cyber Attacks, Security Awareness, Large Language Modeling, Generative AI Agents
Build toward a degree
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Gemini, Gemini, Cloud Deployment, Google Cloud Platform, AI Security, Application Deployment, AI Integrations, Generative AI, Cloud Security
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Threat Detection, Threat Management, Cloud Security, Security Management, Risk Management Framework, Multi-Cloud, Enterprise Security, Cloud Platforms
Intermediate · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Digital Forensics, Security Management, Human Factors (Security), Infrastructure Security, Information Privacy, Key Management, Cyber Governance, Application Security, Network Security, Threat Modeling, Business Continuity Planning, OSI Models, Security Testing, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, Cryptography, Authorization (Computing), Statistical Analysis, Design Research
Earn a degree
Degree · 1 - 4 Years

Google Cloud
Skills you'll gain: Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Data Security, Cybersecurity, Cyber Attacks, Cyber Governance, Cloud Computing, Cloud Standards, Encryption, Infrastructure Security, Google Cloud Platform, Network Security, Security Controls, Authorization (Computing), Authentications, Data Governance, Identity and Access Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Human Factors (Security), User Experience Design, Usability, User Experience, Experience Design, User Interface and User Experience (UI/UX) Design, Threat Modeling, UI/UX Strategy, Application Security, Human Factors, Authentications, UI/UX Research, Human Centered Design, Security Strategy, Authorization (Computing), User Story, Security Controls, Cybersecurity, Safety Standards, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Google Cloud Platform, Threat Management, Email Security, Data Loss Prevention, Data Security, Vulnerability Management, Threat Detection, Security Management, Event Monitoring, Malware Protection, IT Automation, Continuous Monitoring, System Software
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Data Governance, Real Time Data, Data Management, Microsoft SQL Servers, Metadata Management, Data Architecture, Data Security, Security Controls, Power BI, Analytics, Azure Active Directory, System Monitoring, Identity and Access Management, Event-Driven Programming
Intermediate · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Azure Active Directory, MITRE ATT&CK Framework, Threat Modeling, Penetration Testing, Zero Trust Network Access, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Authentications, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Regulatory Requirements, Cloud Security, Cloud Computing, Business Software, Active Directory, Computer Security Incident Management
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Threat Modeling, Incident Management, Remote Access Systems, Incident Response, Security Management, Data Security, Vulnerability Assessments, Law, Regulation, and Compliance, Threat Detection, Computer Security Incident Management, Security Strategy, Cybersecurity, Cyber Security Assessment, Security Software, Vulnerability Management, Computer Security Awareness Training, Telecommuting, Infrastructure Security, Cyber Security Policies, Continuous Monitoring
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: AWS SageMaker, AWS Kinesis, Amazon Web Services, Amazon Redshift, Cloud Security, MLOps (Machine Learning Operations), Amazon S3, Model Training, AWS Identity and Access Management (IAM), Model Deployment, Real Time Data, Feature Engineering, Cloud Storage, Data Storage, Data Security, Encryption, Key Management
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Cyber Security Strategy, Security Management, Cyber Attacks, Cyber Security Policies, Threat Management, Computer Security, Policty Analysis, Research, and Development, World History
Beginner · Course · 1 - 4 Weeks