Data security courses can help you learn encryption techniques, risk assessment strategies, incident response planning, and compliance regulations. You can build skills in vulnerability management, threat detection, and secure coding practices. Many courses introduce tools like firewalls, intrusion detection systems, and data loss prevention software, demonstrating how these skills are applied to protect sensitive information and maintain system integrity.

Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Anomaly Detection, Cybersecurity, Security Controls, Data Analysis Software, Risk Management Framework
Beginner · Course · 1 - 4 Weeks

Tableau Learning Partner
Skills you'll gain: Data Governance, Data Ethics, Data Warehousing, Extract, Transform, Load, Data Quality, Data Management, Tableau Software, Data Lakes, Data Architecture, Data Literacy, Data Storage, Data Modeling, Data Infrastructure, Databases, Business Intelligence, Data Integrity, Spreadsheet Software, Database Management, Relational Databases
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: AI Security, Responsible AI, Large Language Modeling, IT Security Architecture, Threat Modeling, Vulnerability Assessments, Threat Detection, Cybersecurity, Information Systems Security, Cyber Security Strategy, Security Strategy, Security Management, Cyber Attacks, Cloud Security, Security Awareness, Enterprise Security, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response, Natural Language Processing
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Anomaly Detection, AI Security, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Intrusion Detection and Prevention, Fraud detection, Cybersecurity, Applied Machine Learning, Malware Protection, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Network Analysis, Machine Learning, Machine Learning Algorithms, Model Evaluation, Artificial Neural Networks, MLOps (Machine Learning Operations), Data-Driven Decision-Making
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Law, Regulation, and Compliance, Business Risk Management, Consulting, Risk Management, Investigation, Business Consulting, Cyber Security Policies, Security Management, Crisis Management, Enterprise Security, Threat Management, Compliance Management, Entrepreneurship, Safety and Security, Case Studies
Beginner · Course · 1 - 3 Months

Pearson
Skills you'll gain: File Management, Firewall, Linux Administration, Ubuntu, Hardening, Linux Servers, OS Process Management, Linux, Authentications, Zero Trust Network Access, Remote Access Systems, Data Security, User Accounts, Network Security, Linux Commands, Application Security, Security Strategy, Operating System Administration, Information Systems Security, IT Security Architecture
Intermediate · Specialization · 1 - 4 Weeks

Skills you'll gain: Contingency Planning, Business Continuity Planning, Computer Security Incident Management, Security Management, Incident Response, Disaster Recovery, Data Centers, Incident Management, Security Controls, Information Systems Security, Infrastructure Security, Configuration Management, Data Security, Change Control, Digital Forensics
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Endpoint Security, Microsoft Windows, Enterprise Security, Mobile Security, Operating System Administration, Security Management, Android (Operating System), Patch Management, Microsoft Azure, System Monitoring, Azure Active Directory, Vulnerability Management, Apple iOS, Remote Access Systems, Configuration Management, Automation
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Exploitation techniques, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Vulnerability Assessments, Risk Management, Network Security, Application Security, Business Continuity Planning, Asset Management, Cloud Security, OSI Models, Continuous Monitoring
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Governance Risk Management and Compliance, Security Management, Compliance Management, Risk Appetite, Risk Analysis, Risk Mitigation, Business Risk Management, Cyber Governance, Compliance Auditing, Cyber Security Policies, Governance, Data Governance, Security Controls, Vulnerability Assessments, Security Awareness, Vendor Management
Advanced · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Infrastructure Security, Cyber Attacks, Cyber Operations, Cyber Risk, Cyber Security Policies, Cyber Governance, Incident Response, Risk Management Framework, Technology Solutions, Legal Risk
Beginner · Course · 1 - 4 Weeks