Data security courses can help you learn encryption techniques, risk assessment strategies, incident response planning, and compliance regulations. You can build skills in vulnerability management, threat detection, and secure coding practices. Many courses introduce tools like firewalls, intrusion detection systems, and data loss prevention software, demonstrating how these skills are applied to protect sensitive information and maintain system integrity.

Skills you'll gain: Authorization (Computing), Authentications, Azure DevOps, DevSecOps, Security Controls, Performance Tuning, Identity and Access Management, Microsoft Azure, System Monitoring, DevOps, Continuous Monitoring, Personally Identifiable Information, Application Performance Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Firewall, Zero Trust Network Access, Linux Administration, Network Security, Security Strategy, Remote Access Systems, Linux, Security Controls, Unix, Ubuntu, Systems Administration, System Configuration
Intermediate · Course · 1 - 4 Weeks
University of Washington
Skills you'll gain: Data Ethics, Statistical Visualization, Data Storytelling, Data Visualization Software, Data Governance, Big Data, Technical Communication, Cloud Computing, Amazon Web Services, Information Privacy, Ethical Standards And Conduct
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Kubernetes, Incident Response, Threat Detection, DevSecOps, Continuous Monitoring, Security Controls, Infrastructure Security, Event Monitoring, System Monitoring, Containerization, Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, World History, Risk Management Framework
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Threat Detection, Threat Management, Cloud Security, Risk Management Framework, Multi-Cloud, Enterprise Security, Cloud Platforms, Software As A Service
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Role-Based Access Control (RBAC), Multi-Factor Authentication, Authorization (Computing), Security Controls, User Accounts, Key Management, Encryption, Command-Line Interface
Beginner · Course · 1 - 3 Months

University of Illinois Urbana-Champaign
Skills you'll gain: Data Visualization, Interactive Data Visualization, Data Presentation, Infographics, Data Visualization Software, Data Storytelling, Plotly, Matplotlib, Journalism, Graphing, Data Literacy, Color Theory, Data Manipulation, Design Elements And Principles, Data Analysis
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Data Lakes, Data Warehousing, Data Architecture, Data Governance, Data Infrastructure, Google Cloud Platform, Metadata Management, Cloud Storage, Data Storage, Data Management, Data Integration, Data Storage Technologies, Big Data, Advanced Analytics, Operational Databases, Data Security
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Data Literacy, Data Analysis, JSON, Data Transformation, Financial Data, Power BI, Data Wrangling, Data Import/Export, Automation, Business Reporting, Data Cleansing, Extract, Transform, Load, Financial Reporting, Data Structures, Data Pipelines, Data Governance, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Cloud Management, Site Reliability Engineering, Cost Management, Cloud Computing, Google Cloud Platform, DevOps, IT Security Architecture, Data Security, Multi-Tenant Cloud Environments, Financial Controls, System Monitoring, Cybersecurity, Identity and Access Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Linux, Authentications, Remote Access Systems, Linux Administration, User Accounts, Authorization (Computing), Security Controls, System Configuration, Command-Line Interface, Cryptographic Protocols
Intermediate · Course · 1 - 4 Weeks