Network security courses can help you learn about firewalls, intrusion detection systems, and encryption protocols. You can build skills in risk assessment, incident response, and vulnerability management. Many courses introduce tools like Wireshark for network analysis, Nessus for vulnerability scanning, and various security information and event management (SIEM) systems, showing how these skills are applied in practical work to protect networks from cyber threats.

Google Cloud
Skills you'll gain: Cloud Security, Data Security, Cybersecurity, Cloud Computing, Authentications, Google Cloud Platform, Authorization (Computing), Data Encryption Standard, Threat Detection, Infrastructure Security, Regulatory Compliance, Compliance Management, Identity and Access Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Scanning, Microsoft Azure, Vulnerability Assessments, Cloud Security, Continuous Monitoring, Key Management, System Monitoring, Security Controls, Security Information and Event Management (SIEM), Incident Response, Security Management, Hybrid Cloud Computing, Multi-Cloud, Incident Management, Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Kubernetes, Incident Response, Threat Detection, Intrusion Detection and Prevention, DevSecOps, Continuous Monitoring, Security Engineering, Cyber Threat Hunting, Security Controls, Infrastructure Security, Event Monitoring, System Monitoring, Containerization, Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Linux Administration, Ubuntu, Hardening, Linux Servers, Linux, Linux Commands, Application Security, Operating System Administration, Security Controls, Service Management, Patch Management, Systems Administration, Information Systems Security, Package and Software Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Continuous Monitoring, System Monitoring, Vulnerability Scanning, Vulnerability Assessments, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Security Management, Threat Detection, Risk Management Framework, Incident Response, Cyber Risk, Anomaly Detection
Beginner · Course · 1 - 4 Weeks

Banco Interamericano de Desarrollo
Skills you'll gain: Public Safety and National Security, Security Management, Program Evaluation, Governance, Social Justice, Policy Analysis, Policy Development, Public Policies, Criminal Investigation and Forensics, Social Work, Community Development, Conflict Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Management, Security Requirements Analysis, Data Access, Vulnerability Assessments, Data Management, Information Management, Big Data
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Prompt Engineering, Google Cloud Platform, Kubernetes, Identity and Access Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Infrastructure, Cloud Security, Containerization, Cloud Services, Virtual Machines, Infrastructure As A Service (IaaS), Generative AI Agents, Data Loss Prevention, Cloud Storage, Network Infrastructure, Security Management, Application Development, Cloud Computing, Virtual Networking, Malware Protection
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Microsoft Teams, Data Loss Prevention, Data Governance, Compliance Management, Role-Based Access Control (RBAC), Collaborative Software, Windows PowerShell, Security Management, Identity and Access Management, System Monitoring, System Configuration, Event Monitoring, Legal Technology
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: User Experience Design, Usability, User Experience, User Interface and User Experience (UI/UX) Design, Threat Modeling, UI/UX Strategy, Interaction Design, Application Security, Authentications, Human Centered Design, Security Strategy, Usability Testing, Authorization (Computing), Security Controls, Multi-Factor Authentication, Security Awareness, Computer Security Awareness Training, Cybersecurity, Safety Standards, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Data Integrity, Data Management, Personally Identifiable Information, Data Loss Prevention, Cloud Storage, Data Encryption Standard, Authorization (Computing)
Advanced · Course · 1 - 4 Weeks