
Amazon Web Services
Skills you'll gain: Cloud Security, Encryption, Amazon Web Services, Data Security, Cryptography, Security Controls, Cryptographic Protocols
★ 4.9 (46) · Mixed · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Data Security, Threat Detection, Cybersecurity, Cyber Attacks, Cyber Risk, Data Management, Security Controls, Cyber Governance, Security Management, Encryption, Security Software, Cryptography, Data Sharing, Security Strategy, Network Security, Data Access, Risk Modeling, Statistical Methods
★ 4.2 (6) · Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms
★ 4.7 (281) · Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Brute-force attacks, Cryptographic Protocols, Encryption, Key Management, Cybersecurity, Computer Security, Information Assurance, Theoretical Computer Science, Threat Modeling, Communication Systems
★ 4.5 (550) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Controls, Cryptographic Protocols, Security Management, Data Access, Vulnerability Assessments, Encryption, Vulnerability Management, Big Data, Authorization (Computing), Identity and Access Management, Cyber Risk
★ 4.7 (587) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Identity and Access Management, Serverless Computing, Cloud Applications, Google Cloud Platform, Cloud-Based Integration, Cloud Development, Cloud Security, Security Controls, Cloud Deployment, Authorization (Computing), Role-Based Access Control (RBAC), Data Security, Authentications, Operational Databases, Key Management, Encryption, Databases, Application Deployment, Event-Driven Programming, Scalability
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Identity and Access Management, Serverless Computing, Google Cloud Platform, Cloud Development, Cloud Applications, Cloud API, Cloud Security, Cloud Deployment, Cloud-Native Computing, Cloud Services, Cloud-Based Integration, Authorization (Computing), Authentications, Security Controls, Application Deployment, Operational Databases, Event-Driven Programming, Encryption
Intermediate · Course · 1 - 3 Months

University of London
Skills you'll gain: Cryptography, Cryptographic Protocols, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Key Management, Infrastructure Security, Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Mobile Security, Data Integrity
★ 4.6 (76) · Beginner · Course · 1 - 4 Weeks
Duke University
Skills you'll gain: File I/O, UI Components, Java Programming, Object Oriented Design, Software Design, Debugging, Web Design and Development, Software Engineering, Code Reusability, Hypertext Markup Language (HTML), Computer Programming, Program Development, Event-Driven Programming, Bioinformatics, Encryption, Computer Programming Tools, Javascript, Algorithms, Data Analysis, Cascading Style Sheets (CSS)
★ 4.6 (22K) · Beginner · Specialization · 3 - 6 Months

University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, ISO/IEC 27001, Threat Management, Cyber Governance, Risk Management Framework, Computer Security, Information Assurance, Security Controls, Enterprise Security, Data Integrity
★ 4.7 (317) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Data Security, Security Controls, Health Care Procedure and Regulation, Computer Security Awareness Training, Cybersecurity, Cryptographic Protocols, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM)
Beginner · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Security Controls, Multi-Factor Authentication, Security Management, Authorization (Computing), User Accounts, Content Management Systems, User Provisioning, Identity and Access Management, Data Security, Authentications, Data Management, Data Access, IT Security Architecture, Encryption
Intermediate · Course · 3 - 6 Months