
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning
★ 4.6 (2.5K) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Key Management, Network Security, Digital Communications
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Key Management, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications
★ 4.6 (99) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Google Cloud Platform, Serverless Computing, Cloud API, Cloud Applications, Cloud Development, Cloud Deployment, Cloud-Native Computing, Cloud-Based Integration, Cloud Security, Authorization (Computing), Application Security, Event-Driven Programming, Operational Databases, Authentications, Encryption, Scalability
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Kubernetes, Google Cloud Platform, Cloud-Native Computing, Multi-Cloud, Cloud Management, CI/CD, Identity and Access Management, Cloud Computing Architecture, Authentications, Cloud Deployment, Scalability, AI Workflows, Security Controls, Cloud Security, Application Deployment, Authorization (Computing), Configuration Management, Network Security, Encryption
Advanced · Course · 3 - 6 Months

Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Infrastructure Security, Cloud Deployment, Cloud Computing, Threat Detection, Cyber Attacks, Endpoint Detection and Response, Cybersecurity, Information Systems Security, Virtualization, Virtualization and Virtual Machines, Virtual Machines, Security Controls, Intrusion Detection and Prevention, Data Security, Human Factors (Security)
★ 4.7 (34) · Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cryptography, Encryption, Network Security, Cybersecurity, Key Management, Security Engineering, Network Protocols, Federated Learning, Data Integrity, Security Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Controls, Cryptographic Protocols, Security Management, Data Access, Vulnerability Assessments, Encryption, Vulnerability Management, Big Data, Authorization (Computing), Identity and Access Management, Cyber Risk
★ 4.7 (587) · Beginner · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Vector Databases, Grafana, Containerization, Role-Based Access Control (RBAC), Docker (Software), MLOps (Machine Learning Operations), Application Deployment, AI Security, Enterprise Security, Scalability, Data Access, Authorization (Computing), Dashboard Creation, Encryption, Cryptographic Protocols, Performance Tuning, System Monitoring, Infrastructure Security, Continuous Monitoring
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Authentications, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Web Applications, Vulnerability Scanning, Encryption, Key Management, Virtual Machines
★ 4.7 (351) · Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Brute-force attacks, Cryptographic Protocols, Encryption, Key Management, Cybersecurity, Computer Security, Information Assurance, Theoretical Computer Science, Threat Modeling, Communication Systems
★ 4.5 (550) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Brute-force attacks, Cyber Security Assessment, Exploitation techniques, Cyber Security Policies, Hardening, Encryption, Network Security, Security Testing, Cybersecurity, Application Security, Security Strategy, Data Storage, Vulnerability Assessments, Wireless Networks, Authentications, Cryptography, Data Security, Cyber Attacks, Drupal
Intermediate · Course · 1 - 3 Months