Data security courses can help you learn encryption techniques, risk assessment strategies, incident response planning, and compliance regulations. You can build skills in vulnerability management, threat detection, and secure coding practices. Many courses introduce tools like firewalls, intrusion detection systems, and data loss prevention software, demonstrating how these skills are applied to protect sensitive information and maintain system integrity.

Johns Hopkins University
Skills you'll gain: Database Management, Apache Hadoop, Query Languages, Big Data, Databases, SQL, Data Access, Distributed Computing, Performance Tuning, Data Processing, Data Integrity, Authorization (Computing), Data Storage Technologies, File Systems, Algorithms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Google Cloud Platform, Cloud Security, Cloud Computing, Cloud Deployment, Public Cloud, Cloud Infrastructure, Cloud Management, Firewall, Security Management, Identity and Access Management, Network Security, Network Administration, Cloud Storage, General Networking
Intermediate · Project · Less Than 2 Hours

University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, User Centered Design, Design
Mixed · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Email Security, Personally Identifiable Information, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption
Beginner · Course · 1 - 3 Months

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: User Accounts
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Data Management, Data Collection, Data Governance, Data Analysis, Information Privacy, Data Quality, Data Storage, Data Security, Data-Driven Decision-Making, Data Architecture, Data Visualization Software, Big Data, Machine Learning
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Information Systems Security, Cybersecurity, Encryption, Geographic Information Systems
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Key Management, Network Security, Digital Communications, Hardware Architecture
Beginner · Course · 1 - 4 Weeks

ISC2
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Gmail, Authorization (Computing), Google Workspace, Email Security, Data Governance, Cloud Security, Identity and Access Management, Document Management, Data Management, File Management, Enterprise Application Management, User Provisioning, Data Security, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Email Marketing
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geographic Information Systems, Encryption, Data Security, Network Security, Information Systems Security, Web Components, Public Key Infrastructure, Wireless Networks
Beginner · Course · 1 - 4 Weeks