Data security courses can help you learn encryption techniques, risk assessment strategies, incident response planning, and compliance regulations. You can build skills in vulnerability management, threat detection, and secure coding practices. Many courses introduce tools like firewalls, intrusion detection systems, and data loss prevention software, demonstrating how these skills are applied to protect sensitive information and maintain system integrity.

Skills you'll gain: Cloud Deployment, Microsoft Azure, Cloud Applications, Application Deployment, Application Programming Interface (API), Authentications, Payment Systems, Authorization (Computing), Role-Based Access Control (RBAC), UI Components, Identity and Access Management, Database Management, Transaction Processing, User Interface (UI)
Advanced · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Brute-force attacks, Web Scraping
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: General Networking, Network Architecture, Cybersecurity, Computer Networking, Network Security, Threat Detection, Network Routers, Security Controls, Cyber Attacks, Network Switches, Diagram Design, Firewall, Security Strategy
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Exploratory Data Analysis, Model Evaluation, Predictive Modeling, Data Science, Analytical Skills, Data Analysis, Data Presentation, Data Collection, Data Storytelling, Data Cleansing, Statistical Analysis, Data Manipulation, Data Preprocessing, R Programming, Machine Learning, Natural Language Processing
Mixed · Course · 1 - 3 Months
Skills you'll gain: ISO/IEC 27001, Risk Management, Personally Identifiable Information, Enterprise Risk Management (ERM), Business Risk Management, Security Controls, System Implementation, Security Awareness, Information Privacy, Security Management, Security Strategy
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Extract, Transform, Load, Data Modeling, Clinical Data Management, Database Design, Data Warehousing, Data Quality, Data Transformation, Data Integration, Health Informatics, Relational Databases, SQL
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Mac OS, Network Security, Threat Management, Endpoint Security, Threat Detection, Computer Security Awareness Training, Security Strategy, Information Systems Security, Security Controls, Network Protocols, Automation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: SonarQube, Code Review, Vulnerability, CI/CD, Secure Coding, GitLab, Jenkins, Application Security, Vulnerability Assessments, Software Quality Assurance, Maintainability, Kubernetes, GitHub, Software Installation, Security Management, Data Integration, Performance Tuning, Quality Improvement, Technical Management, Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Storytelling, Data Presentation, Storytelling, Interactive Data Visualization, Data Visualization, Infographics, Dashboard, Data Visualization Software, Presentations, Data-Driven Decision-Making, Persuasive Communication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Oracle Cloud, Identity and Access Management, Encryption, Infrastructure Security, Network Security, Data Security, Continuous Monitoring, Cloud Computing, Cloud Infrastructure, Security Strategy, Threat Detection, Data Encryption Standard, Cloud Computing Architecture, Authorization (Computing), Authentications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Hunting, Threat Detection, Incident Response, Cloud Security, Intrusion Detection and Prevention, Microsoft Azure, Security Information and Event Management (SIEM), Malware Protection, Endpoint Security, Azure Active Directory, Anomaly Detection, Email Security, Identity and Access Management, Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
Intermediate · Course · 1 - 3 Months