
Amazon Web Services
Skills you'll gain: Cloud Security, Amazon Web Services, Encryption, Data Security, Cryptography, Security Controls, Cryptographic Protocols
★ 4.9 (46) · Mixed · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Identity and Access Management, Cryptography, AWS Identity and Access Management (IAM), Data Security, Authentications, Threat Detection, Cybersecurity, Encryption, Network Security, Data Management, Azure Active Directory, Security Controls, Cyber Attacks, Cyber Security Strategy, Cyber Governance, Key Management, Security Management, Cyber Risk, Computer Security, Security Awareness
★ 4.4 (11) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Data Infrastructure, Data Architecture, Cloud Infrastructure, Cloud Engineering, Data Warehousing, Capacity Planning, Infrastructure as Code (IaC), Database Architecture and Administration, Cloud Security, Disaster Recovery, Capacity Management, Terraform, Data Security, Site Reliability Engineering, Problem Management, Solution Architecture, Resource Management, Business Continuity Planning, Performance Analysis, Cost Benefit Analysis
Advanced · Course · 1 - 3 Months

Amazon Web Services
Skills you'll gain: Cloud Storage, Amazon Web Services, Data Storage Technologies, Data Storage, Disaster Recovery, Data Store
★ 4.8 (10) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, Cybersecurity, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Blockchain, Algorithms, Data Integrity
★ 5 (46) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Apache Spark, Transaction Processing, Cloud Infrastructure, Data Lakes, PySpark, Data Security, Security Controls, Data Infrastructure, Performance Tuning, Cloud Computing, Cloud Storage, Data Storage Technologies, Data Storage, Cloud Deployment, Data Warehousing, Data Management, Infrastructure Architecture, Data Integrity, Infrastructure as Code (IaC)
Beginner · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Information Systems Security, Network Security, Security Controls, Cybersecurity, Security Awareness, AI Security, Encryption, Cryptography, Security Strategy, Computer Security Awareness Training, Authorization (Computing), Threat Management, Firewall, Authentications, Identity and Access Management, Threat Detection, Hardening, Malware Protection, Cryptographic Protocols
★ 4.8 (26K) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Cloud Security, AWS Identity and Access Management (IAM), Identity and Access Management, Cloud Computing, Security Information and Event Management (SIEM), Cloud Deployment, Cloud Computing Architecture, Cloud Management, Secure Coding, Threat Detection, Cloud Solutions, Cloud Infrastructure, Network Security, Application Security, Data Security, Encryption, Event Monitoring, Security Testing, Cloud Applications, Data Encryption Standard
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Brute-force attacks, Cryptographic Protocols, Encryption, Key Management, Cybersecurity, Computer Security, Information Assurance, Theoretical Computer Science, Threat Modeling, Communication Systems
★ 4.5 (550) · Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Key Management, Brute-force attacks, Algorithms
★ 4.5 (284) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Data Migration, Cloud Storage, Data Management, Data Integration, Data Storage, Data Infrastructure, Data Storage Technologies, Data Compilation, Data Architecture, Cloud Services, Data Security, File Systems, Data Loss Prevention
★ 4.7 (35) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Android Development, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Application Security, Data Loss Prevention, Network Security, Exploitation techniques, Memory Management, File Systems
Mixed · Course · 1 - 4 Weeks