Information security courses can help you learn risk assessment, network security protocols, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability management, and compliance with security regulations. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, demonstrating how these tools are applied to protect data and maintain system integrity.

The Hong Kong University of Science and Technology
Skills you'll gain: Financial Regulation, Financial Regulations, Bank Regulations, FinTech, Financial Services, Financial Industry Regulatory Authorities, Mobile Banking, Regulatory Requirements, Fraud detection, Data Security, Cybersecurity, Insurance, Blockchain, Digital Forensics
Beginner · Course · 1 - 3 Months

Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Cybersecurity, Network Security, Intrusion Detection and Prevention, Cyber Security Strategy, Threat Detection, Distributed Denial-Of-Service (DDoS) Attacks, Wireless Networks
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Cloud Security, Endpoint Detection and Response, Security Controls, Multi-Factor Authentication, Cloud Computing, Identity and Access Management, Enterprise Security, Data Governance, Encryption
Beginner · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Star Schema, Role-Based Access Control (RBAC), Power BI, Database Design, Data Modeling, Financial Modeling, Data Analysis Expressions (DAX), Authorization (Computing), Financial Data, Relational Databases, Data Security, Security Controls, Dashboard, Data Access, Model Deployment, Gross Profit
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Embedded Software, Security Engineering, Application Security, Hardening, Embedded Systems, Infrastructure Security, Information Systems Security, Security Controls, Network Security, Secure Coding, Threat Modeling, Cybersecurity, Encryption, System Configuration, Security Strategy, Federal Information Security Management Act, Linux, Hardware Architecture, Data Storage Technologies, Computer Hardware
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Prometheus (Software), Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Load Balancing, Prompt Engineering, Network Monitoring, Cloud Computing Architecture, Containerization, Application Performance Management, Virtual Networking, Network Architecture, Role-Based Access Control (RBAC), Network Routing, Site Reliability Engineering, Cloud Security, Virtual Private Networks (VPN)
Build toward a degree
Intermediate · Professional Certificate · 3 - 6 Months

Skills you'll gain: Data Loss Prevention, AI Security, Quality Assurance, Hardening, Compliance Reporting, Incident Response, Responsible AI, Threat Management, Information Privacy, Team Performance Management, Stakeholder Communications, Data Quality, Data Mapping, Jira (Software), Project Management Software, Enterprise Security, Automation, Compliance Management, Single Sign-On (SSO), Process Engineering
Advanced · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Application Security, Open Web Application Security Project (OWASP), Secure Coding, Authentications, OAuth, Development Testing, Software Development Life Cycle, Unified Modeling Language, Authorization (Computing), Single Sign-On (SSO), Security Software, Software Development, Vulnerability Assessments, Data Validation, Cyber Security Assessment, Cyber Security Strategy, Cybersecurity, Role-Based Access Control (RBAC)
Intermediate · Course · 3 - 6 Months

Starweaver
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, DevSecOps, Application Security, Cloud Security, Threat Detection, Security Controls, Security Testing, Application Development, Containerization, Software Development, Continuous Monitoring, Cybersecurity, Infrastructure as Code (IaC), Supply Chain, Dependency Analysis
Intermediate · Course · 1 - 3 Months
University of Illinois Urbana-Champaign
Skills you'll gain: Financial Accounting, Balance Sheet, Financial Reporting, Revenue Recognition, Income Statement, Financial Statements, Generally Accepted Accounting Principles (GAAP), Contract Accounting, Accounting, Accrual Accounting, Cash Flows, Financial Analysis, International Financial Reporting Standards
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Key Management, Identity and Access Management, Single Sign-On (SSO), Amazon Web Services, Encryption, Amazon CloudWatch, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Infrastructure Security, Event Monitoring, Continuous Monitoring, Security Information and Event Management (SIEM), Application Security, Security Management, Firewall, Amazon Elastic Compute Cloud, Data Security, Incident Response, Compliance Management
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Endpoint Security, Zero Trust Network Access, Security Strategy, Security Information and Event Management (SIEM), Multi-Factor Authentication, Vulnerability Scanning, Patch Management
Advanced · Course · 1 - 4 Weeks