Network security courses can help you learn about firewalls, intrusion detection systems, and encryption protocols. You can build skills in risk assessment, incident response, and vulnerability management. Many courses introduce tools like Wireshark for network analysis, Nessus for vulnerability scanning, and various security information and event management (SIEM) systems, showing how these skills are applied in practical work to protect networks from cyber threats.

Google Cloud
Skills you'll gain: Google Gemini, Cloud Deployment, Google Cloud Platform, AI Security, Generative AI, Cloud Security, Security Controls, Threat Detection
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Authentications, Cloud Security, Google Cloud Platform, Security Controls, Cloud Computing, Firewall, Role-Based Access Control (RBAC), Authorization (Computing), Virtual Private Networks (VPN), Multi-Factor Authentication, Network Security, Infrastructure Security, Virtual Networking, Load Balancing
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Data Integrity, Data Management, Personally Identifiable Information, Data Loss Prevention, Cloud Storage, Data Encryption Standard, Authorization (Computing)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Linux, Authentications, Remote Access Systems, Linux Administration, User Accounts, Authorization (Computing), Security Controls, System Configuration, Command-Line Interface, Cryptographic Protocols
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Network Security, Information Systems Security, Cloud Security, Cybersecurity, System Monitoring, Internet Of Things, Network Monitoring, Cyber Attacks, Mobile Security, Cryptography, Information Privacy, Authorization (Computing), Wireless Networks, Authentications, Data Storage, Patch Management, Operating Systems, Cloud Services, Cloud Platforms
Intermediate · Specialization · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Vulnerability Assessments, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Linux Commands, Computer Architecture, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Linux Administration, Ubuntu, Hardening, Linux Servers, Linux, Linux Commands, Application Security, Operating System Administration, Security Controls, Service Management, Patch Management, Systems Administration, Information Systems Security, Package and Software Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Management, Data Centers, Security Management, Risk Management Framework, Identity and Access Management, Data Storage Technologies
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: General Data Protection Regulation (GDPR), Information Privacy, Personally Identifiable Information, Data Security, Data Governance, Data Ethics, Data Integrity, Vulnerability Assessments, Law, Regulation, and Compliance, Big Data, Cryptography
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: AWS SageMaker, Amazon CloudWatch, Infrastructure as Code (IaC), CI/CD, Amazon Web Services, Cloud Engineering, Devops Tools, AWS Identity and Access Management (IAM), Data Security, Cloud Security, Network Security, System Monitoring, Model Deployment, Systems Architecture, Multi-Factor Authentication, Key Management, Virtual Networking
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: User Experience Design, Usability, User Experience, User Interface and User Experience (UI/UX) Design, Threat Modeling, UI/UX Strategy, Interaction Design, Application Security, Authentications, Human Centered Design, Security Strategy, Usability Testing, Authorization (Computing), Security Controls, Multi-Factor Authentication, Security Awareness, Computer Security Awareness Training, Cybersecurity, Safety Standards, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Digital Forensics, Business Continuity Planning, Disaster Recovery, Computer Security Incident Management, Resource Management, Prioritization, Risk Analysis, Business Analysis, Data Storage Technologies, Law, Regulation, and Compliance, Ethical Standards And Conduct
Beginner · Course · 1 - 4 Weeks