Internet Security courses can help you learn about network security protocols, encryption techniques, and threat detection methods. You can build skills in risk assessment, incident response, and implementing security policies. Many courses introduce tools like firewalls, intrusion detection systems, and antivirus software, demonstrating how these tools are used to protect sensitive data and maintain system integrity.

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Threat Detection, Network Analysis, TCP/IP, Network Protocols, Cybersecurity, Application Security, Exploitation techniques, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Application Security, Exploitation techniques, Network Security, Security Awareness, Malware Protection, Vulnerability Assessments, Javascript
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Containerization
Intermediate · Course · 1 - 3 Months

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Security, OSI Models, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, TCP/IP, Network Administration, Wireless Networks, Network Protocols, General Networking, Intrusion Detection and Prevention, Local Area Networks, Network Routers, Security Controls, Mobile Security, Authentications, Authorization (Computing)
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Data Security, Personally Identifiable Information, Information Assurance, Security Management, Data Governance, Data Loss Prevention, Data Management, Threat Management, Threat Detection, Encryption, Identity and Access Management
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Intrusion Detection and Prevention, Continuous Monitoring, Threat Management, Firewall, Incident Response, Network Security, Threat Detection, Network Monitoring, Information Systems Security, Infrastructure Security, Cybersecurity
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Cloud Security, API Testing, Wireless Networks
Advanced · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Business Continuity, Cryptography, Secure Coding, Systems Development Life Cycle, Security Controls, Law, Regulation, and Compliance, Infrastructure Security, Safety and Security, Identity and Access Management, Governance, Risk Management
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Network Routing, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Encryption, Cybersecurity, Network Security, Data Security, Cryptography, Cyber Security Policies, Data Integrity, Authentications
Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks