Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security, SQL
Intermediate · Course · 1 - 4 Weeks

Hebrew University of Jerusalem
Skills you'll gain: Electrophysiology, Artificial Neural Networks, Neurology, Computer Science, Cell Biology, Physiology, Psychology, Basic Electrical Systems, Network Analysis, Computational Logic, Simulation and Simulation Software, Mathematical Modeling, Biology
Mixed · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Storytelling, Video Production, Video Editing, Google Gemini, Generative AI, Multimedia, Media Production, Google Workspace
Beginner · Course · 1 - 4 Weeks

Georgia Institute of Technology
Skills you'll gain: Mechanics, Mechanical Engineering, Engineering Analysis, Torque (Physics), Vibrations, Engineering, Physics, Calculus, Mathematical Modeling
Mixed · Course · 1 - 3 Months

Pearson
Skills you'll gain: AI Security, Retrieval-Augmented Generation, AI Orchestration, Responsible AI, LangChain, Threat Modeling, Generative AI, Vector Databases, Embeddings, Secure Coding, Large Language Modeling, Open Web Application Security Project (OWASP), Threat Management, Security Testing, Security Controls, Prompt Engineering
Intermediate · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Microsoft Azure, Cyber Governance, System Monitoring, Identity and Access Management, Cloud Security, Enterprise Security, Data Governance, Authorization (Computing), Multi-Factor Authentication, User Accounts, Authentications
Intermediate · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Bash (Scripting Language), Shell Script, Linux Commands, Command-Line Interface, Linux, Scripting, File I/O
Intermediate · Guided Project · Less Than 2 Hours

University of California, Irvine
Skills you'll gain: Extract, Transform, Load, Data Warehousing, Data Mining, Business Intelligence, Star Schema, Snowflake Schema, Data Modeling, Unsupervised Learning, Business Analytics, Data-Driven Decision-Making, Predictive Modeling, Cloud Computing, Market Analysis, Supervised Learning, Classification Algorithms
Beginner · Course · 1 - 4 Weeks

Institut Mines-Télécom
Skills you'll gain: Threat Modeling, Threat Detection, Open Web Application Security Project (OWASP), Cybersecurity, Cyber Attacks, Application Security, Network Security, Security Testing, Vulnerability Assessments, Security Controls, Secure Coding, SQL
Intermediate · Course · 1 - 3 Months

University of Florida
Skills you'll gain: Sports Medicine, Coaching, Athletic Training, Pediatrics, Exercise Science, Physiology, Kinesiology, Child Development, Working With Children, Anatomy, Training Programs, Injury Prevention, Coordination, Nutrition and Diet, Planning
Beginner · Course · 1 - 3 Months

Edge Impulse
Skills you'll gain: Model Evaluation, Applied Machine Learning, Embedded Software, Data Preprocessing, Embedded Systems, Machine Learning, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Data Ethics, Deep Learning, Model Deployment, Convolutional Neural Networks, Data Analysis, Feature Engineering, Computer Programming, Digital Signal Processing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)
Intermediate · Course · 1 - 3 Months