Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Skills you'll gain: AI Security, Threat Modeling, Threat Management, MITRE ATT&CK Framework, LangChain, Threat Detection, Responsible AI, Large Language Modeling, Continuous Monitoring, Event Monitoring, Security Testing, Generative AI, Embeddings, System Monitoring, LangGraph, Prompt Engineering, Vector Databases
Intermediate · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Threat Detection, Identity and Access Management, Incident Response, Cybersecurity, Cyber Attacks, Cyber Security Strategy, Threat Management, Zero Trust Network Access, MITRE ATT&CK Framework, Security Management, Cyber Security Policies, Security Awareness, Security Information and Event Management (SIEM), Security Controls, Endpoint Security, User Accounts, General Data Protection Regulation (GDPR)
Beginner · Course · 1 - 3 Months

Skills you'll gain: Restful API, Data Mapping, Scalability, Information Architecture, Data Management, Data Structures, Query Languages, JSON, Data Import/Export, Big Data
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Gemini, Google Gemini, Multimodal Prompts, Retrieval-Augmented Generation, Query Languages, Data Manipulation, Data Store, Embeddings, Metadata Management, Document Management, Text Mining, Data Capture, Cloud API, Image Analysis, Cloud Computing, Artificial Intelligence
Intermediate · Project · Less Than 2 Hours

Skills you'll gain: Project Documentation, Lean Six Sigma, Project Management, Project Scoping, Google Docs, Timelines
Beginner · Guided Project · Less Than 2 Hours

SkillUp
Skills you'll gain: Group Policy, Dynamic Host Configuration Protocol (DHCP), Azure Active Directory, Active Directory, Windows Servers, Hyper-V, iSCSI Configuration, Virtual Private Networks (VPN), Containerization, Microsoft Azure, Kubernetes, Microsoft Windows, Docker (Software), Hybrid Cloud Computing, Virtualization, Virtual Machines, Server Administration, Network Administration, Authentications, Infrastructure As A Service (IaaS)
Intermediate · Specialization · 1 - 3 Months

Corporate Finance Institute
Skills you'll gain: Power BI, Data Analysis Expressions (DAX), Dashboard, Business Intelligence, Data Import/Export, Business Reporting, Interactive Data Visualization, Data Storytelling, Data Modeling, Data Transformation, Data Visualization Software, Data Analysis, Data Sharing, Sales, Key Performance Indicators (KPIs)
Beginner · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment
Intermediate · Course · 1 - 4 Weeks

Alibaba Cloud Academy
Skills you'll gain: Dashboard, Big Data, Data Processing, Data Visualization Software, Apache Hive, Apache Spark, Apache Hadoop, Pandas (Python Package), Data Manipulation, SQL, Extract, Transform, Load, Data Pipelines, PySpark, Business Intelligence, Data Integration, Database Management, Cloud Storage
Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
Intermediate · Course · 1 - 4 Weeks

Amazon Web Services
Skills you'll gain: Amazon Web Services, Amazon S3, Technical Communication
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Cloud Security, Internet Of Things, Infrastructure Security, Vulnerability Management, Information Systems Security, Incident Response, Identity and Access Management, Threat Management, Security Strategy, Penetration Testing, Network Security, Security Controls, Cloud Computing, Cloud Computing Architecture, Threat Detection, Cloud Deployment
Intermediate · Course · 1 - 4 Weeks