Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Cyber Attacks, Security Information and Event Management (SIEM), Event Monitoring, Cyber Engineering, Patch Management, Network Security, Malware Protection, Continuous Monitoring, Security Management, Cyber Risk, Digital Forensics, Risk Analysis
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Penetration Testing, Brute-force attacks, Encryption, Network Security, Cybersecurity, Data Storage, Vulnerability Assessments, Wireless Networks, Authentications, Data Security, Cyber Attacks, Drupal, Mac OS, Linux, Blockchain
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Detection, Cyber Security Strategy, Cyber Threat Intelligence, Cybersecurity, Interactive Data Visualization, Geospatial Information and Technology, Web Scraping, Digital Forensics, IT Automation, Data Security, Security Awareness, Personally Identifiable Information, Network Security, Scripting, Network Analysis, Open Source Technology, Data Analysis Software, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Continuous Monitoring, Cybersecurity, Cyber Security Assessment, Cyber Attacks, Event Monitoring, Data Security, Vulnerability, System Monitoring, Analysis, Network Security, Network Monitoring, Criminal Investigation and Forensics, Linux Commands, System Configuration, Bash (Scripting Language), Python Programming, Scripting, Linux, Scripting Languages
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Computer Security Incident Management, Mitigation, Cyber Threat Hunting, Digital Forensics, Cybersecurity, Security Information and Event Management (SIEM), Intrusion Detection and Prevention, Incident Management, Criminal Investigation and Forensics, Information Systems Security, Continuous Monitoring, Cyber Attacks, Computer Security, Network Security, Analysis, Network Analysis, Linux Commands, Bash (Scripting Language), Windows PowerShell
Mixed · Course · 1 - 4 Weeks
Starweaver
Skills you'll gain: Cloud Security, Cloud Services, Cloud Technologies, Cloud Computing Architecture, Cloud Computing, Cloud Infrastructure, Incident Response, Hardening, Public Cloud, Infrastructure As A Service (IaaS), ISO/IEC 27001, Virtual Machines, Identity and Access Management, Security Controls, Amazon Web Services, NIST 800-53, Network Security, Cloud Applications, Role-Based Access Control (RBAC), Platform As A Service (PaaS)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Continuous Monitoring, Security Controls, Cybersecurity, Risk Management Framework, Cyber Risk, NIST 800-53, Risk Management, Cloud Security, Cyber Security Assessment, Incident Response, Authorization (Computing), Vulnerability Assessments, Disaster Recovery
Beginner · Course · 1 - 3 Months
Skills you'll gain: Incident Response, Computer Security Incident Management, Operational Risk, Case Studies, Security Management, Risk Management, Risk Mitigation, Intellectual Property, Crisis Management, Cybersecurity, Manufacturing Operations, Security Controls, Security Strategy, Cyber Security Strategy, Cyber Attacks, Cyber Engineering, Continuous Monitoring, Compliance Reporting, Governance, Design
Intermediate · Course · 1 - 4 Weeks

Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Data Lakes, Amazon DynamoDB, Amazon Web Services, Serverless Computing, Cloud Computing, Amazon S3, Scalability, Cloud Infrastructure, Amazon Elastic Compute Cloud, Event-Driven Programming, Cloud Security, Solution Architecture, Data Visualization, Cloud Storage, Data Architecture, Cloud Computing Architecture, API Gateway, Software Architecture
Build toward a degree
Intermediate · Professional Certificate · 3 - 6 Months

Skills you'll gain: Responsible AI, Google Gemini, LLM Application, AI Enablement, AI Product Strategy, Stakeholder Analysis
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Security Management, Incident Management, Cyber Risk, Regulatory Compliance, Compliance Management, Information Systems Security, Cyber Security Strategy, Cybersecurity, Enterprise Security, Federal Information Security Management Act, Law, Regulation, and Compliance, Regulation and Legal Compliance, Payment Card Industry (PCI) Data Security Standards, Computer Security, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Network Security, Sarbanes Oxley Act (SOX) Compliance, General Data Protection Regulation (GDPR)
Mixed · Course · 1 - 3 Months

Skills you'll gain: Exploitation techniques, Penetration Testing, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Event Monitoring, Vulnerability Management, Vulnerability, Continuous Monitoring, Data Security, Network Security, Analysis, Criminal Investigation and Forensics, System Monitoring, System Configuration, Network Monitoring, Bash (Scripting Language), Scripting, Linux, Python Programming
Advanced · Specialization · 1 - 3 Months