
Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, MySQL, Vulnerability Scanning, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL
Mixed · Course · 1 - 4 Weeks

Universidad de los Andes
Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Threat Modeling, Cybersecurity, Vulnerability Management, Exploitation techniques, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Security Requirements Analysis, Cyber Risk, Human Factors (Security), Application Servers, Web Servers
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Data Integrity, Data Integration, Power BI, Data Maintenance, Database Management, Microsoft SQL Servers, Relational Databases, Databases, Application Programming Interface (API), Dashboard, Data Visualization, Interactive Data Visualization, Business Intelligence, Data Security, Systems Integration, Role-Based Access Control (RBAC), Auditing, Real Time Data, Data Encryption Standard
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Security Awareness, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Computing, Data Security, Identity and Access Management, Human Factors (Security), Software As A Service
Beginner · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: SQL, Transaction Processing, Query Languages, Database Management, Data Manipulation, Data Security, Stored Procedure, Relational Databases, Data Transformation, Data Storage, Data Integrity, Authorization (Computing), Data Dictionary
Intermediate · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Cyber Risk, Application Security, Threat Detection, Information Systems Security, Network Security, Computer Security, Encryption
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Data Governance, Data Integrity, Data Encryption Standard, Security Management, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Data Security, Cybersecurity, Data Ethics, Authentications, Data Encryption Standard, Computer Security Awareness Training, Cryptography, Information Assurance, Cyber Security Policies, Cyber Threat Intelligence, Authorization (Computing), Security Controls, Information Privacy, Encryption, Security Awareness, Human Factors (Security), Risk Analysis, Problem Solving, Communication
Build toward a degree
Beginner · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, User Accounts, Data Validation, Debugging, Cryptography, C (Programming Language), File Management, OS Process Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Power BI, Azure Synapse Analytics, Microsoft Azure, Governance, Real Time Data, Enterprise Architecture, Application Deployment, Data Architecture, DevOps, Database Architecture and Administration, Data Integration, Data Security, Microsoft 365, Role-Based Access Control (RBAC), Scalability, Collaborative Software, Version Control
Intermediate · Course · 1 - 3 Months

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Performance Tuning, Hibernate (Java), Development Testing, JUnit
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Malware Protection, Google Cloud Platform, Vulnerability Management, Security Controls, System Monitoring, Event Monitoring, Security Management, Threat Detection
Intermediate · Course · 1 - 4 Weeks