
Skills you'll gain: Identity and Access Management, Business Continuity, Cryptographic Protocols, Network Security, Cryptography, Encryption, User Provisioning, Security Management, Penetration Testing, ISO/IEC 27001, Threat Management, Network Performance Management, Information Systems Security, Network Architecture, Cyber Operations, Data Management, Vulnerability Management, Software Development Methodologies, Cybersecurity, Configuration Management
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Security Awareness, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Security Strategy, Cyber Risk, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Identity and Access Management, Data Management, Cryptography
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cryptography, Encryption, Network Security, Cybersecurity, Key Management, Security Engineering, Network Protocols, Federated Learning, Data Integrity, Security Management
Beginner · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Blockchain, Cryptography, Encryption, Key Management, Cryptographic Protocols, Data Security, Quantum computing, Information Privacy, Algorithms
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Prompt Engineering, Kubernetes, Prompt Engineering Tools, Cloud Security, Containerization, Infrastructure As A Service (IaaS), Prompt Patterns, OAuth, Cloud Platforms, Cloud Storage, Cloud Services, Security Controls, Threat Management, Application Security, Data Security
Intermediate · Specialization · 3 - 6 Months

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Data Encryption Standard, Public Key Cryptography Standards (PKCS), Cybersecurity, Advanced Encryption Standard (AES), Authentications, Brute-force attacks, Data Integrity, Algorithms
Beginner · Course · 1 - 4 Weeks

Princeton University
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Encryption, Payment Systems, FinTech, Public Key Cryptography Standards (PKCS), Key Management, Application Security, Digital Assets, Network Protocols, Transaction Processing, Data Storage, Process Analysis, Distributed Computing, Emerging Technologies, Scripting, Application Specific Integrated Circuits, Financial Policy, Financial Regulation
Mixed · Course · 1 - 3 Months

Skills you'll gain: Data Security, Security Controls, Health Care Procedure and Regulation, Computer Security Awareness Training, Cybersecurity, Cryptographic Protocols, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Security Testing, Data Import/Export, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, SQL, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Public Key Cryptography Standards (PKCS), Data Integrity
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Google Cloud Platform, Cloud Infrastructure, Infrastructure As A Service (IaaS), Cloud Computing, Cloud Solutions, Cloud Engineering, Cloud Services, Cloud Computing Architecture, Data Storage Technologies, Cloud Management, Data Storage, Cloud Security, Role-Based Access Control (RBAC), Authorization (Computing), Capacity Management, Databases, System Monitoring, Application Performance Management, NoSQL
Intermediate · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Cloud Security, Open Web Application Security Project (OWASP), Data Governance, Data Management, Data Security, Cloud API, Secure Coding, Application Security, DevSecOps, Cloud Applications, Key Management, Encryption, Information Privacy, OAuth, Cloud Storage, API Gateway, Threat Modeling, Data Encryption Standard, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks