Data security courses can help you learn encryption techniques, risk assessment strategies, incident response planning, and compliance regulations. You can build skills in vulnerability management, threat detection, and secure coding practices. Many courses introduce tools like firewalls, intrusion detection systems, and data loss prevention software, demonstrating how these skills are applied to protect sensitive information and maintain system integrity.

Universidades Anáhuac
Skills you'll gain: Malware Protection, Information Systems Security, Cybersecurity, Cyber Attacks, Data Security, Computer Security Awareness Training, Security Awareness, Network Security, Information Assurance, Security Controls, Human Factors (Security), Vulnerability Assessments
Intermediate · Course · 1 - 3 Months
Google Cloud
Skills you'll gain: Data Governance, Data Loss Prevention, Gmail, Google Workspace, Information Management, Data Management, Data Security, Document Management, Records Management, Data Storage, Data Access, Data Import/Export, Email Security, System Configuration
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Cloud Security, Data Security, Kubernetes, Security Controls, Hardening, Database Architecture and Administration, Identity and Access Management, Data Storage Technologies, Infrastructure Security, Data Storage, Role-Based Access Control (RBAC), System Configuration, Continuous Monitoring, Encryption, Key Management, Containerization, Data Governance
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Statistical Methods, Sample Size Determination, Data Preprocessing, Record Keeping
Beginner · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks

University of Michigan
Skills you'll gain: Cyber Security Policies, Security Engineering, Cybersecurity, Security Awareness, Vulnerability, Threat Modeling, Policy Analysis, Political Sciences, Public Policies, Public Safety and National Security, Human Factors, Human Computer Interaction, Usability, Software Testing
Beginner · Course · 1 - 3 Months
Skills you'll gain: Information Privacy, Data Governance, Law, Regulation, and Compliance, Personally Identifiable Information, General Data Protection Regulation (GDPR), Data Security, Data Management, Data Architecture, Data Strategy, Data Ethics, Metadata Management, Encryption
Mixed · Course · 1 - 3 Months

Skills you'll gain: Key Management, Encryption, Amazon CloudWatch, Amazon Web Services, AWS Identity and Access Management (IAM), Cloud Security, Event Monitoring, Continuous Monitoring, Security Information and Event Management (SIEM), Data Security, Advanced Encryption Standard (AES), System Monitoring, Amazon S3, Incident Response
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft SQL Servers, Data Security, Microsoft Azure, Cloud Security, Database Management, Data Management, Data Access, Role-Based Access Control (RBAC)
Intermediate · Guided Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Data Lakes, Cloud Storage, Data Security, Data Access, Role-Based Access Control (RBAC), Cloud Computing, Big Data, Data Analysis
Beginner · Project · Less Than 2 Hours

Skills you'll gain: PostgreSQL, Data Maintenance, Database Administration, Database Architecture and Administration, SQL, Secure Coding, Database Management, Relational Databases, Query Languages, Security Controls, Data Access, Data Security, Role-Based Access Control (RBAC), Threat Management, Threat Detection
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Database Management, Apache Hadoop, Query Languages, Big Data, Databases, SQL, Data Access, Distributed Computing, Performance Tuning, Data Processing, Data Integrity, Authorization (Computing), Data Storage Technologies, File Systems, Algorithms
Intermediate · Course · 1 - 4 Weeks