Data security courses can help you learn encryption techniques, risk assessment strategies, incident response planning, and compliance regulations. You can build skills in vulnerability management, threat detection, and secure coding practices. Many courses introduce tools like firewalls, intrusion detection systems, and data loss prevention software, demonstrating how these skills are applied to protect sensitive information and maintain system integrity.

Skills you'll gain: Linux Administration, Linux, User Accounts, Identity and Access Management, Authentications, Virtual Machines, Virtualization, Operating System Administration, Security Controls, System Configuration, Command-Line Interface
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Threat Modeling, Cryptography, Cryptographic Protocols, Threat Management, Security Engineering, Network Security, Data Security, Vulnerability Assessments, Threat Detection, Information Systems Security, Vulnerability Management, Cyber Security Strategy, Key Management, Encryption, Network Protocols, Scripting, Regulatory Compliance, Financial Regulation, Scalability
Intermediate · Specialization · 3 - 6 Months

Google Cloud
Skills you'll gain: Google Gemini, AI Security, Cloud Deployment, Google Cloud Platform, Cloud Security, Generative AI, Vulnerability Assessments, Security Controls, Security Engineering
Beginner · Course · 1 - 4 Weeks

Amazon Web Services
Skills you'll gain: Amazon Bedrock, AI Security, Prompt Engineering, Generative AI, Computer Security, Secure Coding, Security Engineering, Hardening, Application Security, Cyber Engineering, Responsible AI, Security Testing, Threat Modeling, Security Controls
Beginner · Course · 1 - 4 Weeks

DeepLearning.AI
Skills you'll gain: Linear Algebra, NumPy, Dimensionality Reduction, Data Preprocessing, Machine Learning Methods, Advanced Mathematics, Data Manipulation, Applied Mathematics, Mathematical Modeling, Machine Learning, Python Programming, Algebra
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, Continuous Monitoring, Security Management, Vulnerability Management, Authorization (Computing), Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Storytelling, Data Presentation, Storytelling, Interactive Data Visualization, Data Visualization, Infographics, Dashboard, Data Visualization Software, Presentations, Data-Driven Decision-Making, Persuasive Communication
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Computer Security, OSI Models, Systems Administration, Virtualization, Operating System Administration, Information Technology, Enterprise Security, Cybersecurity, Network Administration, Computer Networking, Virtual Machines, Enterprise Architecture, Data Integrity
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, Vulnerability Scanning, Continuous Deployment
Advanced · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Microsoft Servers, Operating System Administration, Systems Administration, Virtualization, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Cloud Computing, Virtual Networking, Firewall, Network Security, Data Access, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Authentications, Public Cloud, Load Balancing
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques, Software Design Patterns
Intermediate · Specialization · 3 - 6 Months