
Skills you'll gain: Microsoft SQL Servers, Data Storage Technologies, Database Architecture and Administration, Disaster Recovery, Database Management, Cloud Storage, Google Cloud Platform, Software Installation
Intermediate · Project · Less Than 2 Hours

Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, DevSecOps, Application Security, Security Requirements Analysis, Vulnerability Management, Threat Management, Security Testing, Secure Coding, Vulnerability Assessments, Penetration Testing, Security Awareness, Security Strategy, DevOps, Technology Roadmaps, Risk Management Framework, Software Development Life Cycle
Intermediate · Course · 1 - 3 Months

Packt
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Data Security, Cybersecurity, Cyber Attacks, Web Applications, Threat Detection, Security Awareness, Vulnerability Management, Encryption, Authentications, Authorization (Computing), PHP (Scripting Language)
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Database Design, Database Management Systems, Database Development, Relational Databases, Database Theory, Databases, Database Architecture and Administration, Data Modeling, Data Integrity, Metadata Management, Dependency Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: MySQL, Database Management, Database Administration, Data Warehousing, Linux Commands, Data Integrity, Unit Testing, Algorithms, Software Versioning, Command-Line Interface, Software Visualization, Linux, Pseudocode, Query Languages, Collaborative Software, Django (Web Framework), Database Architecture and Administration, Computational Thinking, Test Driven Development (TDD), File Management
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Azure Active Directory, Authentications, Microsoft Azure, Authorization (Computing), Network Security, Virtual Private Networks (VPN), Identity and Access Management, Firewall, Active Directory, Cloud Security, User Provisioning, Network Administration, Infrastructure Security, Security Management, Role-Based Access Control (RBAC), Kubernetes, Single Sign-On (SSO), User Accounts, Data Security, Data Access
Intermediate · Specialization · 1 - 3 Months

Macquarie University
Skills you'll gain: Responsible AI, Security Controls, Application Security, Cyber Attacks, Cyber Threat Intelligence, Cybersecurity, Data Security, DevSecOps, Security Engineering, Artificial Intelligence, Threat Modeling, Cyber Governance, Artificial Intelligence and Machine Learning (AI/ML), Risk Management, Encryption, Application Programming Interface (API), Machine Learning, Governance, Regulation and Legal Compliance, Applied Machine Learning
Beginner · Course · 1 - 3 Months

Cisco Learning and Certifications
Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Cybersecurity, Network Security, Security Information and Event Management (SIEM), Network Monitoring, Network Analysis, Intrusion Detection and Prevention, Event Monitoring, Continuous Monitoring, Threat Detection, Incident Response
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: MySQL, Database Management, Stored Procedure, Database Design, Database Systems, Relational Databases, SQL, Database Development, Database Administration, Query Languages, Data Management, Data Integrity, Data Validation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: MongoDB, NoSQL, Databases, PostgreSQL, Database Management Systems, Relational Databases, SQL, Database Design, Applied Machine Learning, Artificial Intelligence, Database Architecture and Administration, Database Management, LLM Application, Natural Language Processing, Apache Cassandra, Text Mining, Generative AI, Node.JS, Machine Learning, Data Science
Intermediate · Specialization · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Vulnerability Assessments, Application Specific Integrated Circuits, Exploit development, Cryptography, Systems Design, Encryption, Exploitation techniques, Technical Design, Emerging Technologies
Mixed · Course · 1 - 3 Months