Network security courses can help you learn about firewalls, intrusion detection systems, and encryption protocols. You can build skills in risk assessment, incident response, and vulnerability management. Many courses introduce tools like Wireshark for network analysis, Nessus for vulnerability scanning, and various security information and event management (SIEM) systems, showing how these skills are applied in practical work to protect networks from cyber threats.

LearnKartS
Skills you'll gain: Threat Modeling, Cyber Threat Intelligence, Incident Response, DevSecOps, MITRE ATT&CK Framework, Cloud Security, Threat Detection, Risk Management, Cost Management, Cyber Security Strategy, Governance, Security Controls, Vulnerability Assessments, Compliance Management, Role-Based Access Control (RBAC), Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Operating Systems
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Google Cloud Platform, Cloud Security, Network Security, Network Administration, Firewall, Virtual Networking, Data Migration
Intermediate · Project · Less Than 2 Hours

Skills you'll gain: Malware Protection, Cyber Attacks, Cybersecurity, Network Security, Cyber Security Policies, Brute-force attacks, Distributed Denial-Of-Service (DDoS) Attacks, Security Controls, Security Awareness, Firewall, Multi-Factor Authentication, Encryption
Beginner · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Loss Prevention, Google Cloud Platform, Application Security, Threat Management, Vulnerability Management, Personally Identifiable Information, Data Security, Infrastructure Security, Threat Detection, Continuous Monitoring, System Monitoring, Identity and Access Management, Real Time Data
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Knowledge of Apple Software, Apple Service Certification, Application Lifecycle Management, Endpoint Security, Knowledge of Apple Hardware, Mobile Development Tools, Test Planning
Advanced · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: AI Security, Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Security Testing, Threat Modeling, Data Security, Security Controls, Cyber Security Assessment, Cybersecurity, Security Awareness, Threat Management, Continuous Monitoring, Authorization (Computing), Encryption, Penetration Testing, Data Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Penetration Testing, Cyber Threat Intelligence
Beginner · Course · 1 - 3 Months

Skills you'll gain: Security Management, Security Strategy, Configuration Management, Security Controls, Information Systems Security, Computer Security Awareness Training, Enterprise Security, Change Control, Safety and Security, Cyber Security Policies, Data Ethics
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Deployment, Cloud Computing Architecture, Public Cloud, Cloud Security, Data Import/Export, Load Balancing, Virtual Networking, Multi-Factor Authentication, Event Monitoring, Data Storage, MySQL, Key Management, Scalability
Intermediate · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Vulnerability Assessments, System Design and Implementation, Threat Detection, Cryptography, Risk Management, Remote Access Systems
Beginner · Course · 1 - 3 Months