Data security courses can help you learn encryption techniques, risk assessment strategies, incident response planning, and compliance regulations. You can build skills in vulnerability management, threat detection, and secure coding practices. Many courses introduce tools like firewalls, intrusion detection systems, and data loss prevention software, demonstrating how these skills are applied to protect sensitive information and maintain system integrity.
Google Cloud
Skills you'll gain: Data Governance, Data Loss Prevention, Gmail, Google Workspace, Information Management, Data Management, Data Security, Document Management, Records Management, Data Storage, Data Access, Data Import/Export, Email Security, System Configuration
Beginner · Course · 1 - 4 Weeks

Fred Hutchinson Cancer Center
Skills you'll gain: Data Ethics, Data Sharing, Personally Identifiable Information, Clinical Research Ethics, Institutional Review Board (IRB), Healthcare Ethics, Data Security, Data Governance, Information Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management, Informed Consent, Encryption
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: Secure Coding, Agile Methodology, Security Management, Cyber Security Policies, Cyber Security Assessment, Technical Management, Performance Metric, Risk Management
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Information Privacy, Data Governance, Law, Regulation, and Compliance, Personally Identifiable Information, General Data Protection Regulation (GDPR), Data Security, Data Management, Data Architecture, Data Strategy, Data Ethics, Metadata Management, Encryption
Mixed · Course · 1 - 3 Months

SkillUp
Skills you'll gain: Personally Identifiable Information, Cybersecurity, General Data Protection Regulation (GDPR), Information Privacy, Data Security, Threat Detection, Data Loss Prevention, Incident Response, Data Governance, Law, Regulation, and Compliance, Data Management, Data Storage, Data Integrity, Data Ethics, Regulation and Legal Compliance
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Data Management, Microsoft Azure, Real Time Data, Metadata Management, Data Architecture, Event-Driven Programming, Personally Identifiable Information, Operational Databases, Identity and Access Management, Power BI, Data Modeling, Security Controls, Role-Based Access Control (RBAC), Database Architecture and Administration, Analytics, Azure Active Directory, System Monitoring, Enterprise Architecture, Taxonomy, Hybrid Cloud Computing
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Cyber Risk, Personally Identifiable Information, Security Management, ISO/IEC 27001, Information Privacy, NIST 800-53, Infrastructure as Code (IaC), Security Controls, Google Cloud Platform
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Generative AI, Technology Solutions, Security Awareness, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Data Security, Personally Identifiable Information, Information Assurance, Security Management, Data Governance, Data Loss Prevention, Data Management, Threat Management, Threat Detection, Encryption, Identity and Access Management
Advanced · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Cybersecurity, Threat Management, Cyber Attacks, Threat Detection, Cloud Security, Disaster Recovery, Network Security, Malware Protection, Data Security, Intrusion Detection and Prevention, Infrastructure Security, Hardening, Systems Architecture, Encryption
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Security Awareness, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Computing, Data Security, Identity and Access Management, Human Factors (Security), Software As A Service
Beginner · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks